Open Access Open Access  Restricted Access Subscription Access

Mobile Elements Data Integration and Enhancing Security with Leach Protocol Using WSN


Affiliations
1 MCA Department, Y.M.T College of Management, Kharghar, India
 

A wireless sensor network is a group of specialized transducers with a communications infrastructure for monitoring and recording conditions at diverse locations. Commonly monitored parameters are temperature, humidity, pressure, wind direction and speed, illumination intensity, vibration intensity, sound intensity, power-line voltage, chemical concentrations, pollutant levels and vital body functions. It Provide a bridge between the real physical and virtual worlds. wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. To enhance the security of sensor nodes, the data transmitted must be encrypted among sensor nodes In this paper we applied Data Encryption Standard scheme to add security to LEACH protocol. The objective of this paper is to add secret encryption scheme to the LEACH protocol.

Keywords

Wireless Sensor Network, LEACH, DES, BS, Applications.
User
Notifications
Font Size

  • Hemali M. Bhalodiya ,Sunera Kargathara “A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network”
  • L. Jun, H. Qi, L. Yan, “A Modified LEACH algorithm in wireless sensor network based on ns2,” in Proc. of International Conference on Computer Science and Information Processing, pp. 604-606, 2012
  • J. F. Yan, Y. L. Liu, “Improved LEACH routing protocol for large scale wireless sensor networks routing,” in Proc. of International Conference on Electronics, Communications and Control, pp. 3754-3757, 2011
  • A. Somasundara, A. Ramamoorthy, and M. Srivastava, “MobileElement Scheduling for Efficient Data Collection in WirelessSensor Networks with Dynamic Deadlines,” Proc. IEEE 25th Int’lReal-Time Systems Symp. (RTSS ’04), 2004.
  • S. D. Muruganthan, D. C. F. Ma, B. Rollyi, A. Fapojuwo, “A centralized energy-efficient routing protocol for wireless sensor networks,” IEEE Radio Communications, vol. 43, no. 3, pp. 8-13, 2005
  • Mayur S, Ranjith H.D,”Security Enhancment on LEACH Protocol From HELLO Flood Attack in WSN Using LDK Scheme”
  • Muneer Alshowkan, Khaled Elleithy, Hussain AlHassan “LS-LEACH: A New Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks”
  • H. Modares, R. Salleh, and A. Moravejosharieh, "Overview of Security Issues in Wireless Sensor Networks,"

Abstract Views: 308

PDF Views: 154




  • Mobile Elements Data Integration and Enhancing Security with Leach Protocol Using WSN

Abstract Views: 308  |  PDF Views: 154

Authors

Pooja Mehta
MCA Department, Y.M.T College of Management, Kharghar, India

Abstract


A wireless sensor network is a group of specialized transducers with a communications infrastructure for monitoring and recording conditions at diverse locations. Commonly monitored parameters are temperature, humidity, pressure, wind direction and speed, illumination intensity, vibration intensity, sound intensity, power-line voltage, chemical concentrations, pollutant levels and vital body functions. It Provide a bridge between the real physical and virtual worlds. wireless sensor networks was motivated by military applications such as battlefield surveillance; today such networks are used in many industrial and consumer applications, such as industrial process monitoring and control, machine health monitoring, and so on. To enhance the security of sensor nodes, the data transmitted must be encrypted among sensor nodes In this paper we applied Data Encryption Standard scheme to add security to LEACH protocol. The objective of this paper is to add secret encryption scheme to the LEACH protocol.

Keywords


Wireless Sensor Network, LEACH, DES, BS, Applications.

References