Abstract
Wireless sensor networks have become very popular because of their capability to connect the physical environment to the virtual world. Due to its numerous advantages, they are widely spreading in various industries. WSNs are made of numerous sensor nodes and a node or storage node. The sensor nodes are responsible for sensing the surrounding physical environment like pressure, temperature, etc., and the collected data is transported to the storage node and base station. Due to its various advantages, they are used in many industrial applications such as war zones, automated medical applications. One of the main considerations of a WSN is security. WSNs are used in a few important domains like military, etc., where security is extremely important. In such cases, data confidentiality and authentication play an important role. Hence security algorithms have to be included in order to maintain privacy. A WSN has limited resources like battery power, storage capacity and processing capability. Hence they have to be utilized efficiently. In this paper, a Low Energy Adaptive Clustering Hierarchy (LEACH) is implemented in MATLAB. And RSA encryption is done for safe data transfer between the nodes in a wireless sensor network. Initially, some amount of energy is allotted to all the nodes in the WSN. All the nodes are allotted with a unique Id, type of the cluster. There are two phases of implementation, namely set-up and steady phases. Once the cluster head is nominated, the encrypted data is sent from the one node to the other destination node in a WSN. RSA algorithm is used to encrypt the data before the data is sent over from the starting node. The data is again decrypted at the destination node. After implementation of all the rounds, the number of dead nodes is displayed. Finally, the energy consumed is also displayed along with the encrypted and decrypted message.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Sekhar, V.C., Sarvabhatla, M.: Security in wireless sensor networks with public key techniques. Int. Conf. Comput. Commun. Informatics 2012, 1–16 (2012). https://doi.org/10.1109/ICCCI.2012.6158861
Akyildiz, F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Commun. Mag. 40(8), 102–114 (2002)
Kaur, A., Saini, S.: Simulation of low energy adaptive clustering hierarchy protocol for wireless sensor network
Perrig, R.A., Stankovic, J., Wagner, D.: Security in wireless sensor networks. Commun. ACM 47(6) (June 2004)
Kalita, H.K., Kar, A.: Wireless sensor network security analysis. Int. J. Next-Gener. Netw. (IJNGN), 1(1), (Dec 2009)
Potlapally, N., Ravi, S., Raghunathan, A., Jha, N.K.: Analyzing the energy consumption of security protocols. ISLPED (2003)
Koc, K.: High-speed RSA implementation. Tech. Rep. TR 201, RSA Laboratories, (Nov 1994)
Sharifnejad, M., Shari, M., Ghiasabadi, M., Beheshti, S.: A survey on wireless sensor networks security. SETIT (2007)
John, T.O., Ukwuoma, H., Danjuma, S., Ibrahim, M.: Energy consumption in wireless sensor network. (2016)
Asaduzzaman, Kong, H.Y.: Energy efficient cooperative LEACH protocol for wireless sensor networks. J. Commun. Netw. 12(4), 358–365 (Aug 2010). https://doi.org/10.1109/JCN.2010.6388472
Xiangning, Yulin, S.: Improvement on LEACH protocol of wireless sensor network. 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007), pp 260–264. (2007). https://doi.org/10.1109/SENSORCOMM.2007.4394931
Tyagi, P., Verma, V.: LEACH routing protocol for wireless sensor networks: a survey. (2018)
Kalkha, H., Satori, H., Satori, K.: Performance Evaluation of AODV and LEACH Routing Protocol (2016)
Asaad, M., Al-Janabi, M.: Adaptive security approach for wireless sensor network using RSA algorithm. Indonesian J. Electr. Eng. Comput. Sci. 22, 361. https://doi.org/10.11591/ijeecs.v22.i1.pp361-368
Carman, W., Kruus, P.S., Matt, B.J.: Constraint and approaches for distributed sensor security. Netw. Associates Labs Tech. Rep. (2000)
Singh, Rathkanthiwar, S., Kakde, S.: LEACH based-energy efficient routing protocol for wireless sensor networks. 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), pp. 4654–4658. (2016). https://doi.org/10.1109/ICEEOT.2016.7755602
Gaur, S.S., Mohapatra, A.K., Roges, R.: An efficient certificateless authentication encryption for WSN based on clustering algorithm. Int. J. Appl. Eng. Res. 12, 4184–4190 (2017)
Suma, V., Haoxiang, W.: Optimal key handover management for enhancing security in mobile network. J. Trends Comput. Sci. Smart Technol. (TCSST) 2(04), 181–187 (2020); Shakya, S., Pulchowk, L.N.: The robust routing protocol with authentication for wireless adhoc networks. J. ISMAC 2(02), 83–95 (2020)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Aruna Deepthi, S., Aruna, V., Leelavathi, R. (2022). Image Transmission Using Leach and Security Using RSA in Wireless Sensor Networks. In: Smys, S., Tavares, J.M.R.S., Balas, V.E. (eds) Computational Vision and Bio-Inspired Computing. Advances in Intelligent Systems and Computing, vol 1420. Springer, Singapore. https://doi.org/10.1007/978-981-16-9573-5_3
Download citation
DOI: https://doi.org/10.1007/978-981-16-9573-5_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-9572-8
Online ISBN: 978-981-16-9573-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)