Image Transmission Using Leach and Security Using RSA in Wireless Sensor Networks

被引:0
作者
Deepthi, S. Aruna [1 ]
Aruna, V [1 ]
Leelavathi, R. [1 ]
机构
[1] Vasavi Coll Engn, Hyderabad, India
来源
COMPUTATIONAL VISION AND BIO-INSPIRED COMPUTING ( ICCVBIC 2021) | 2022年 / 1420卷
关键词
WSN; Leach; RSA; Security; Encryption; Decryption;
D O I
10.1007/978-981-16-9573-5_3
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Wireless sensor networks have become very popular because of their capability to connect the physical environment to the virtual world. Due to its numerous advantages, they are widely spreading in various industries. WSNs are made of numerous sensor nodes and a node or storage node. The sensor nodes are responsible for sensing the surrounding physical environment like pressure, temperature, etc., and the collected data is transported to the storage node and base station. Due to its various advantages, they are used in many industrial applications such as war zones, automated medical applications. One of the main considerations of a WSN is security. WSNs are used in a few important domains like military, etc., where security is extremely important. In such cases, data confidentiality and authentication play an important role. Hence security algorithms have to be included in order to maintain privacy. A WSN has limited resources like battery power, storage capacity and processing capability. Hence they have to be utilized efficiently. In this paper, a Low Energy Adaptive Clustering Hierarchy (LEACH) is implemented in MATLAB. And RSA encryption is done for safe data transfer between the nodes in a wireless sensor network. Initially, some amount of energy is allotted to all the nodes in the WSN. All the nodes are allotted with a unique Id, type of the cluster. There are two phases of implementation, namely set-up and steady phases. Once the cluster head is nominated, the encrypted data is sent from the one node to the other destination node in a WSN. RSA algorithm is used to encrypt the data before the data is sent over from the starting node. The data is again decrypted at the destination node. After implementation of all the rounds, the number of dead nodes is displayed. Finally, the energy consumed is also displayed along with the encrypted and decrypted message.
引用
收藏
页码:39 / 51
页数:13
相关论文
共 18 条
[1]   A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[2]  
[Anonymous], 2012, INT C COMP COMM INF, DOI DOI 10.1109/ICCCI.2012.6158861
[3]  
Asaad M., INDONESIAN J ELECT E, V22, P361, DOI [10.11591/ijeecs.v22. i1.pp361-368, DOI 10.11591/IJEECS.V22.I1.PP361-368]
[4]   Energy Efficient Cooperative LEACH Protocol for Wireless Sensor Networks [J].
Asaduzzaman ;
Kong, Hyung Yun .
JOURNAL OF COMMUNICATIONS AND NETWORKS, 2010, 12 (04) :358-365
[5]  
Carman W., 2000, CONSTRAINT APPROACHE
[6]  
Fan Xiangning, 2007, 2007 International Conference on Sensor Technologies and Applications - SensorComm 2007, P260
[7]  
Gaur S.S., 2017, INT J APPL ENG RES, V12, P4184
[8]  
John T, 2016, ENERGY CONSUMPTION W
[9]  
Kalita H. K., 2009, INT J COMPUTER SCI I
[10]  
Kalkha H., 2016, PERFORMANCE EVALUATI