Secure Data Communication in I-Leach Protocol in Wireless Sensor Networks

D. Raghavaraju*
Assistant Professor, Department of Computers and Systems Engineering, SVIT, Anantapur, India.
Periodicity:April - June'2017
DOI : https://doi.org/10.26634/jwcn.6.1.13770

Abstract

Around 70% of the aggregate vitality is scattered for information transmission in the greater part of the Wireless Sensor Network (WSN) applications. Another basic issue is security in wireless networks and various security plans are created to give administrations of security. In any case, these calculations have their own shortcomings, for example, helpless against picked plaintext assault, and computational multifaceted nature Routing of energy efficiency and Communication of data security in WSN. This paper proposes Improved LEACH/ILEACH protocol which increases network lifetime and it will improve the quality of QoS. Along the network lifetime, they propose a secure way to aggregate the data in ILEACH. The experimental results show that the proposed technique is giving better results in terms of energy consumption than existing techniques.

Keywords

Wireless Sensor, Lifetime, Clusters, K-Means, Power

How to Cite this Article?

Raghavaraju, D. (2017). Secure Data Communication in I-Leach Protocol in Wireless Sensor Networks. i-manager’s Journal on Wireless Communication Networks, 6(1), 7-11. https://doi.org/10.26634/jwcn.6.1.13770

References

[1]. Buttyán, L., Schaffer, P., & Vajda, I. (2006, March). Resilient aggregation with attack detection in sensor networks. In Pervasive Computing and Communications Workshops, 2006. PerCom Workshops 2006. Fourth Annual IEEE International Conference on (pp. 5-pp). IEEE.
[2]. Chan, H., Perrig, A., & Song, D. (2006, October). Secure hierarchical in-network aggregation in sensor th networks. In Proceedings of the 13 ACM Conference on Computer and Communications Security (pp. 278-287). ACM.
[3]. Considine, J., Li, F., Kollios, G., & Byers, J. (2004, March). Approximate aggregation techniques for sensor th databases. In Data Engineering, 2004. Proceedings. 20 International Conference on (pp. 449-460). IEEE.
[4]. Flajolet, P., & Martin, G. N. (1985). Probabilistic counting algorithms for database applications. Journal of Computer and System Sciences, 31(2), 182-209.
[5]. Frikken, K. B., & Dougherty IV, J. A. (2008, March). An efficient integrity-preserving scheme for hierarchical sensor aggregation. In Proceedings of the First ACM Conference on Wireless Network Security (pp. 68-76). ACM.
[6]. Garofalakis, M., Hellerstein, J. M., & Maniatis, P. (2007, April). Proof sketches: Verifiable in-network aggregation. rd In Data Engineering, 2007. ICDE 2007. IEEE 23 International Conference on (pp. 996-1005). IEEE.
[7]. Greenwald, M. B., & Khanna, S. (2004, June). Powerconserving computation of order-statistics over sensor networks. In Proceedings of the Twenty-Third ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems (pp. 275-285). ACM.
[8]. Madden, S., Franklin, M. J., Hellerstein, J. M., & Hong, W. (2002). TAG: A tiny aggregation service for ad-hoc sensor networks. ACM SIGOPS Operating Systems Review, 36(SI), 131-146.
[9]. Nath, S., Gibbons, P. B., Seshan, S., & Anderson, Z. R. (2004, November). Synopsis diffusion for robust nd aggregation in sensor networks. In Proceedings of the 2 International Conference on Embedded Networked Sensor Systems (pp. 250-262). ACM.
[10]. Przydatek, B., Song, D., & Perrig, A. (2003, November). SIA: Secure information aggregation in st sensor networks. In Proceedings of the 1 International Conference on Embedded Networked Sensor Systems (pp. 255-265). ACM.
[11]. Rahayu, T. M., Lee, S. G., & Lee, H. J. (2015). A secure routing protocol for wireless sensor networks considering secure data aggregation. Sensors, 15(7), 15127-15158.
[12]. Wagner, D. (2004, October). Resilient aggregation in nd sensor networks. In Proceedings of the 2 ACM Workshop on Security of Ad Hoc and Sensor Networks (pp. 78-87). ACM.
[13]. Yang, Y., Wang, X., Zhu, S., & Cao, G. (2006). SDAP: A Secure hop-by-hop Data Aggregation Protocol for sensor networks. In Proc. Seventh ACM Int. Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), 2006.
[14]. Zhao, J., Govindan, R., & Estrin, D. (2003, May). Computing aggregates for monitoring wireless sensor networks. In Sensor Network Protocols and Applications, 2003. Proceedings of the First IEEE. 2003 IEEE International Workshop on (pp. 139-148). IEEE.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.