Open Access   Article Go Back

Improved Watermarking Leach Protocol using node level Integrity and Confidentiality in WSN

Rekha Rani1 , Rajan Manro2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 597-601, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.597601

Online published on Nov 30, 2018

Copyright © Rekha Rani, Rajan Manro . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Rekha Rani, Rajan Manro, “Improved Watermarking Leach Protocol using node level Integrity and Confidentiality in WSN,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.597-601, 2018.

MLA Style Citation: Rekha Rani, Rajan Manro "Improved Watermarking Leach Protocol using node level Integrity and Confidentiality in WSN." International Journal of Computer Sciences and Engineering 6.11 (2018): 597-601.

APA Style Citation: Rekha Rani, Rajan Manro, (2018). Improved Watermarking Leach Protocol using node level Integrity and Confidentiality in WSN. International Journal of Computer Sciences and Engineering, 6(11), 597-601.

BibTex Style Citation:
@article{Rani_2018,
author = {Rekha Rani, Rajan Manro},
title = {Improved Watermarking Leach Protocol using node level Integrity and Confidentiality in WSN},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {597-601},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3210},
doi = {https://doi.org/10.26438/ijcse/v6i11.597601}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.597601}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3210
TI - Improved Watermarking Leach Protocol using node level Integrity and Confidentiality in WSN
T2 - International Journal of Computer Sciences and Engineering
AU - Rekha Rani, Rajan Manro
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 597-601
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
371 213 downloads 261 downloads
  
  
           

Abstract

Wireless sensor network is a network which consists of number of sensor nodes which sense the data and send to sink node. As detecting sensor data with defective readings is an important issue for secure communication. So, necessity of privacy and integrity of information is mandatory. Thus, cryptography is an effective technique that provides privacy and integrity to sensed data. This paper, deals with the improvement of watermarking LEACH with node level data integrity and confidentiality.

Key-Words / Index Term

WSN, integrity, confidentiality, watermarking

References

[1] S. chowiak, P., “Cryptographic Key Distribution In Wireless Sensor Networks Using Bilinear Pairings,” PhD diss., Dublin City University, 2010.
[2] S., A. Reisslein, M.Towards, “Efficient wireless video sensor network: A survey of existing node architecture and proposal for a flexi-WVSNP design”, IEEE commun.surv. Tutor, pp. 462-486, 2011.
[3] B. Tavli, K. Bicakci, R. Zilan and B. Ordinas, J.M., “A survey of visual sensor network platforms multitimed Tools”, pp. 689-726, 2012 .
[4] N. kumar, J. Kaur “Improved LEACH Protocol for Wireless Sensor Networks”, IEEE 2011.
[5] Reshma I. Tandel , “Leach Protocol in Wireless Sensor Network: A Survey”, International Journal of Computer Science and Information Technologies, pp. 1894-1896, 2016.
[6] B. Zhenshan, X. Bo and Z. Wenbo. “HT-LEACH: An Improved Energy Efficient Algorithm Based on LEACH”, International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC), 2013.
[7] M. Pejanović Đurišić , Z. Tafa and G. Dimić , “A survey of military applications of wireless sensor networks” Mediterranean Conference on Embedded Computing (MECO), IEEE 2012.
[8] K. JeongGil, L. Chenyang, B. Mani,. Srivastava , A. John, Stankovic and Andreas , “ Wireless Sensor Networks for Healthcare”, Proceedings of the IEEE, pp. 1947 – 1960, Nov. 2010.
[9] Y. Dunfan, D. Gong and W. Wang, “Application of wireless sensor networks in environmental monitoring”, 2nd International Conference on Power Electronics and Intelligent Transportation System (PEITS), IEEE 2009.
[10] L. Ruiz-Garcia ,L. Lunadei, P. Barreiro and I. Robla, “A Review of Wireless Sensor Technologies and Applications in Agriculture and Food Industry: State of the Art and Current Trends” , pp.4728-4750,2009.
[11] Nikolas, A. Pantazis, Stefanos, A. Nikolidakis and Dimitrios D. Vergados, “Energy – Efficient Routing Protocols in Wireless Sensor Networks: A Survey”, IEEE Communications Surveys & Tutorials.
[12] A. Gupta and A. Nayyar, “A Comprehensive Review of Cluster-Based Energy Efficient Routing Protocols in Wireless Sensor Networks”, International Journal of Research in Computer and Communication Technology, 2014.
[13] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci, “Wireless sensor networks: a survey”, Computer Networks,pp. 393–422, 2002.
[14] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy efficient communication protocol for wireless microsensor networks,” in 33rd Annual Hawaii International Conference on System Sciences, pp. 3005 – 3014,2000.
[15]R. Patel, S. Pariyani and V. Ukani,” Energy and hroughput Analysis of Hierarchical Routing Protocol(LEACH) for Wireless Sensor Networks”, International Journal of Computer Applications, 2011.
[16] Y. Ren Tsai, “Coverage Preserving Routing Protocols for Randomly Distributed Wireless Sensor Networks”, IEEE Transactions on Wireless Communications, 2007.
[17] J. FENG YAN, “ Improved LEACH Routing Protocol For Large Scale Wireless Sensor Networks”, YUAN-LIU LIU School of Computer Science & Technology Soochow university Soochow 215006, China, IEEE 2011.
[18] Nejla Rouissia and Hamza Gharsellaouib, “Improved Hybrid LEACH Based Approach for Preserving Secured Integrity in Wireless Sensor Networks”, International Conference on Knowledge Based and Intelligent Information and Engineering Systems, pp. 1429-1438, 2017.
[19] B. Djallel Eddine, S. Boubiche and A. Bilami, “A Cross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous WSNs” Communications Letters, IEEE, 2015.
[20] G. Kaur, N. Kumar, “Secure and Efficient Data Collection in WSN”, International Journal of Advanced Research in Computer Science and Software Engineering, 2015.
[21] DG. Costa ,S. Figuerłdo and G. Oliveira, “Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions”, 2017.
[22].A.Singh, M.Marwaha, B.Singh, S.Singh, “Comparative Study of DES, 3DES, AES and RSA”, International Journal of Computers and Technology, 2013.
[23]P.Pritto Paul, N.Sankar Ram and M.Usha, “Symmetric Key Encryption for Secure Communication Using Wireless Hart in Wireless Sensor Networks (WSN)”, Australian Journal of Basic and Applied Sciences, 2016.
[24] Zhang, J., R. Shankaran, M.A. Orgun, V. Varadharajan, A. Sattar, “A trust management architecture for hierarchical wireless sensor networks. In Local Computer Networks (LCN)”, IEEE 35th Conference ,pp: 264-267,2010.
[25] H. P. Keeler, P. G. Taylor, “A stochastic analysis of a greedy routing scheme in sensor networks”, SIAM Journal on Applied Mathematics, pp. 2214-2238, 2010.
[26] W. R. Heinzelman, J. Kulik, H. Balakrishnan, “Adaptive protocols for information dissemination in wireless sensor networks”, in Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, Seattle, Washington, USA, pp. 174-185, 1999.
[27] X. Liu, “A Survey on Clustering Routing Protocols in Wireless Sensor Networks”, Sensors, pp. 11113-11153, 2012.
[28`] S. Naeimi, H. Ghafghazi, C.-O. Chow, H. Ishii, “A Survey on the Taxonomy of Cluster-Based Routing Protocols for Homogeneous Wireless Sensor Networks”, Sensors, 2012.
[29] J. Grover, Shikha, M. Sharma, “Location based protocols in Wireless Sensor Network: A review”, in Proceedings of the International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1-5,2014.
[30] Z. Kai, T. Libiao, L. Wenjun., “Location-Based Routing Algorithms for Wireless Sensor Network”.Emerging Technologies of Future Multimedia Coding, Analysis and Transmission,2009.
[31] Y. B. Ko, N. H. Vaidya, “Location Aided Routing (LAR) in mobile ad hoc networks”, Wireless networks, pp. 307-321, 2000.
[32] G. Sharma, A. Kumar, "REVIN: Reduced Energy Virtuous Immune Network for WSN", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.1-8, 2017.
[33] M. Bhardwaj, "Faulty Link Detection in Cluster based Energy Efficient Wireless Sensor Networks", International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.3, pp.1-8, 2017