sis 18: e5

Research Article

An Experimental Analysis of Secure-Energy Trade-Off using Optimized Routing Protocol In modern-secure-WSN

Download34 downloads
  • @ARTICLE{10.4108/eai.13-7-2018.163094,
        author={S. Venkataramana and B.V.D.S. Sekhar and Bh. V.S. Ramakrishnam Raju and V.V.S.S.S. Chakravarthy and G. Srinivas},
        title={An Experimental Analysis of Secure-Energy Trade-Off using Optimized Routing Protocol In modern-secure-WSN},
        journal={EAI Endorsed Transactions on Scalable Information Systems: Online First},
        volume={},
        number={},
        publisher={EAI},
        journal_a={SIS},
        year={2020},
        month={2},
        keywords={Modern-WSN, Energy Efficiency, QoPML, SAMA and LEACH Protocol},
        doi={10.4108/eai.13-7-2018.163094}
    }
    
  • S. Venkataramana
    B.V.D.S. Sekhar
    Bh. V.S. Ramakrishnam Raju
    V.V.S.S.S. Chakravarthy
    G. Srinivas
    Year: 2020
    An Experimental Analysis of Secure-Energy Trade-Off using Optimized Routing Protocol In modern-secure-WSN
    SIS
    EAI
    DOI: 10.4108/eai.13-7-2018.163094
S. Venkataramana1,*, B.V.D.S. Sekhar1, Bh. V.S. Ramakrishnam Raju1, V.V.S.S.S. Chakravarthy2, G. Srinivas3
  • 1: Department of Information Technology, S.R.K.R. Engineering College, Bhimavaram, A.P, India
  • 2: Department of ECE, Raghu Institute of Technology, Dakamarri, Visakhapatnam, A.P, India
  • 3: Department of CSE, GITAM University, Visakhapatnam, A.P, India
*Contact email: svramana@srkrec.ac.in

Abstract

In modern secure Wireless Sensor Networks (WSN), the sensor-nodes need extra energy owing to secure transmission of perceived information. So the energy-utilization of sensor-node should calculate while transfer the sensed-attributes securely to network. In this experimentation, we are proposing a revised Low Energy Adaptive Clustering Hierarchy (LEACH) protocol as LEATCH along secure information transmission (privacy and node authentication) in various levels using Quality of Protection Modeling Language (QoPML), which balance the Security-Energy trade-offs. This research experimentally analyzes the impact of data privacy, authentication operations on energy-utilization at sensor-node level while applying a LEACH & LEATCH. The obtained outcomes indicate the optimized LEATCH is outperforming correlated to the basic Leach with respect to minimal energy-utilization, time efficiency and expands life-time of modern-secure-WSNs.