SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1774
Enhancing Data Transmission and Protection in Wireless Sensor Node
Prajwali wamanrao Gawande1, Prof. Vijay Bagdi2
1Department of Computer Science and Engineering Abha Gaikwad Pati College of Engineering Nagpur,
Maharashtra, India
2Department of Computer Science and Engineering Abha Gaikwad Pati College of Engineering Nagpur,
Maharashtra, India
------------------------------------------------------------------------***-------------------------------------------------------------------------
Abstract - In order to discover physical or environmental
conditions, such as sound, temperature, pressure, etc. and to
send their data through the network to the main location, a
wireless sensor network (WSN) is used since it has many
independent sensors. With the management requests and
responses and the data issuing from the network’s actual
sensing application additional traffic is created. By sending
and processing the data together the system’s energy can be
reduced, instead of performing the operations individually.
The primary objectives of the routing protocol which is
designed in wireless sensor network are energy consumption,
balancing the network and extending the network’s lifetime.
In this paper, we have also proposed the technique for
increasing the efficiency of a node aswellasprovidingsecurity
to the data and we have also discussed the problems of
transmitting data over wireless sensor network
Key Words: Wireless Sensor network, Nodes, LEACH,
Clustering, cluster-head, RC-6
1. INTRODUCTION
A self-organized network composed by a largenumber
of micro sensors that are randomly deployed in monitoring
region through wireless communication is known as
Wireless sensor network [1]. Energy-efficient mechanism is
important because each sensor node in wireless sensor
network has a constraint energy capacity. In wirelesssensor
network, the highest priority should be given to sending
packets from the source node to the destination node rather
than sensing an event. A typical node (Berkeleynode)havea
configurationof8-bitCPU(4MHz),128KBflash,4KBRAMand
Transmission range of 100 Feets [3].
In WSN the nodes are made up of electronic devices that
which can sense, compute and transmit data from physical
environments. Limited energy resources have been
comprised by these sensor nodes. To extend the lifetime of
network, energy resources for wireless sensor networks
should be managed wisely. Transmitting data over the WSN
securely is the another problem in WSN.
1.1 Efficiency of node:-
Energy wastage, in wireless communications shortens the
network lifetime. Major reasons of energy wastage are as
follows
 Idle listening: - Idle listening happens whenthe radiois
listening to the channel to receive the possible data
which is not sent.
 Collisions: - Collision occurs when two nodes transmit
at the same time and interfere with each other.
 Control:-Control deals with packet overhead for
protocols to exchange required information.
 Overhearing: - Overhearing occurs whena sensornode
receives packets that are not destined to it. This is the
dominant factor of energy wastage, when traffic load is
heavy and node density is high.
This paper is organized as follows detailed description on
Leach protocol is given in Section 2 gives, Section 3 givesthe
improvement in leach protocol in order to increase the
efficiency of node, Section 4 gives the algorithm used to
retain security, Section 5 gives the output obtained by using
leach protocol and RC-6, Section 6 gives the comparison of
data transfer over WSN using proposed methodandexisting
method, Section 7 discusses the conclusion.
2. LEACH PROTOCOL
2.1 Protocol Description
In WSN, LEACH is theearliest proposedsingle-hopclustering
routing protocol. It can save network energy greatly
compared with the non-cluster routing algorithm. Many
other clustering algorithm are proposed based on LEACH,
such as TEEN (Threshold Sensitive Energy Efficient Sensor
Network Protocol)[4]PEGASIS(PowerEfficientGatheringin
Sensor Information Systems) [5] HEED (Hybrid Energy-
Efficient Distributed Clustering) [6] and so on. All clusters
are self-organized in LEACH protocol; each cluster contains
several non-cluster head nodes and a cluster-head. The
cluster-head node consumes more energy than non-cluster
head nodes. In order to balance network energy
consumption and prolong the network life cycle, it selects
cluster head randomly and each node has an equal chanceto
be the cluster-head [7]. The cluster structure update
constantly in operation and one updating processis calleda
Round. The cycle of each round contains two stages: set-up
phase and steady-state phase, set-up phase is the
establishment phase of the cluster whereas steady-state
phase is the stable data transfer phase. InSet-upphase, each
node generates a random number from 0 to 1,andcompares
this number with the threshold value T (n). If the number is
less than T (n), the no of node is selected as a cluster-head;
the threshold T (n) i set in the following manner: - s
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1775
Where n refers the identification of node in the current
sensor network; p is the percentage of cluster-heads; r is the
current round number; G is the set of nodes that have not
been elected as cluster-head in the last 1/p rounds.
Once the cluster-head is calculated, the cluster-head sendsa
broadcast message to the network and declares itself as the
cluster-head. Each normal node decideswhichclusterto join
in according to the signal strength of the received message
and then sends a request message to the corresponding
cluster-head.
The cluster-head receives all the messageswhicharesent by
the nodes that are willing to join in the cluster. LEACH
protocol has a relatively better function in energy
consumption through dynamic clustering, keeping the data
transmission in cluster which reduces the energy
consumption through communicating directly between
nodes and the base station, but there are still a lot of
inadequacies.
The mechanism of cluster-head rotation is used in LEACH
protocol. The cluster-head is elected randomly. After
multiple rounds of data transmission, the residual energy of
the nodes will have a great difference. The nodes or the
cluster-head which are far from the base station will
consume more energy in transmitting the data of the same
length relatively. After that, if they are selected as cluster-
heads, they will run out of energy and become invalid.Asthe
number of invalid nodes increases,it’ll havea greatinfluence
in the network performance and reduce the life of the
network. On the basis of received signal intensity to join,
Cluster member nodes selects the optimal cluster-head.
Neither consider the distance fromthe nodeitselftothebase
station nor the distance between cluster-head and the base
station. So normal node may choose the cluster-head that is
far from base station as its optimal cluster-head, this not
only is the heavy burden to the cluster-head but also
increases the extra energy consumption, which is not
beneficial to balance network energy consumption.
3. IMPROVEMENT OF THE LEACH PROTOCOL
This paper considers node energy and position information
to improve the LEACH algorithm,energybalancedclustering
algorithm named 2Head-LEACH algorithm to improve the
energy of the node is proposed here.
Cluster-head Selection
Based on residual energy, there are many improved
methods of the cluster-head selectionthethreshold equation
in [2] is as follows
Ecur is the current energy of node. E0 is the initial energy of
the node. In this improvement the current energy is taken
into consideration, and increases the probabilityofthehigh-
energy nodes to become cluster-head, but there is also a
significant problem. When the remaining energy of a node is
very less than threshold value, the threshold T (n) becomes
very small, the probabilityof thenode random numberbeing
smaller than the threshold becomes small, the cluster-head
nodes in the network will be too little, because of the
untimely death, the selected cluster-head consumes too
much energy and thus affects the network life. The above
method doesn’t consider the influence of the distance
between nodes and the base station in electing cluster-head.
In this paper, instead of threshold value weareselectingtwo
cluster-head by comparing their energies. In normal leach
protocol, there is only single cluster-head and it depends
upon threshold value after sending a data node losses some
energy so it again apply algorithm to find new cluster head.
Hence transmission delay is being caused. In proposed
technique there are two cluster-head if one goes down
second take its position. By using 2Head- LEACH algorithm
much energy can be saved and transmission delay can be
reduced.
Example: -
When it transmits data to another node. If we have a WSN
With the 100 nodes we divide that100nodeinto thenumber
of clusters say four. i.e.; each cluster contains 25 nodes. Now
we compare the energy of nodes with another node in the
same cluster. So we get max energy node. We consider it as
cluster-head-1 and applysameprocesstofindsecondcluster
head-2. Perform the same operation for all the remaining
clusters
IV. SECURITY
Low power design is the basic nature of WSN, which forces
security mechanisms to fit under very limiting processing
and bandwidth constraints, hence security to data, has been
the challenging issue. The security requirements in WSN are
the authentication of entity, message, data,especiallyindata
critical applications. It is observed in [8] that due to Sensor
Node Constraints and Networking Constraints in WSN’s.
Most of the protocols [9][10] are based on Symmetric key
cryptography. We believe that RC6 is well-suited to meet all
of the requirements of the Advanced Encryption Standard.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1776
Details of RC6
Like RC5, RC6 is a fully parameterized family of encryption
algorithms. A version of RC6 is more accurately specified as
RC6-w/r/b where the word size is w bits, encryption
consists of a nonnegative number of rounds r, and b denotes
the length of the encryption key in bytes. Since the AES
submission is targeted at w = 32 and r = 20, we shall use RC6
as shorthand to refer to such versions.
When any other value of w or r is intended in the text, the
parameter values will be specified as RC6-w/r. Of particular
relevance to the AES effort will be the versions of RC6 with
16-, 24-, and 32-byte keys. For all variants, RC6-w/r/b
operates on units of four w-bit words using the following six
basic operations. The base-two logarithm of w will be
denoted by lgw.
a + b integer addition modulo 2w
a - b integer subtraction modulo 2w
bitwise exclusive-or of w-bit words
integer multiplication modulo 2w .
a<<<b rotate the w-bit word a to theleftbytheamountgiven
by the least significant lgw bits of b.
a>>>b rotate the w-bit word a to the right by the amount
given by the least significant lgw bits of b.
The following figure shows the encryption and decryption
algorithm of RC-6.
Fig 1:- Encryption with RC-6
Fig 2:- Decryption with RC-6
It consists of six additions, two exclusive-ors, two
squaring, two left-rotates by five bits, and two left-rotates
by a variable quantity r. Note that we have counted B _ (2B
+ 1) = 2B2 + B as a squaring and two additions.
These basic operations can be implemented on an 8-bit
processor in the following way (ignoring addressing
instructions):
1. A 32-bit addition can be computed using four 8-bit
additions with carry (ADDC).
2. A 32-bit exclusive-or can be computed using four8-
bit exclusive-ors (XRL).
3. A 32-bit squaring can be computed using six 8-bit
by 8-bit multiplications (MUL) andelevenadditions
with carry (ADDC). Note that six multiplicationsare
enough since we only need the lower 32 bits of the
64-bit product.
4. Rotating a 32-bit word left by five bit positions can
be computed by rotating the word right by one bit
position three times and then permuting the four
bytes. Note that rotating the word right by one bit
position can be done using four byte rotations with
carry (RRC).
5. Rotating a 32-bit word left by r can be computed by
rotating the word left or right by one bit position r0
times (r0 _ 4, with average two) andthenpermuting
the four bytes appropriately. The five least-
significant bits of r are used to determine r0andthe
permutation which can be controlled using jumps
(JB).
6. Most instructions take one cycle except that MUL
takes four cycles and JB takes two cycles. Putting
things together, we can estimatethetotal numberof
cycles needed for one round of RC6.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1777
5. OUTPUT
If you want to send the data from node 1 to 14.
Fig 3:- By using Leach and RC-6
Fig 4:- node 2 is cluster head of 1st cluster
Fig 5:- node 8 is cluster head on 2nd
Fig 6:- node 13 is cluster head of 3rd head.
Fig 7:- data reach to node 14.
6. COMPARISON
This section deals with comparing energy efficient data
transfer securely over WSN by leachprotocol andbyexisting
methods.
We compare this protocol on following parameters.
1. On Transmission Delay.
Transmission delay (or store-and-forward delay, also
known as packetization delay) is the amount of time
required to push all of the packet's bits into the wire. In
other words, this is the delay caused by the data-rate of
the link. Transmission delay is a function of the packet's
length and has nothing to do with the distance between
the two nodes. This delay is proportional to the packet's
length in bits.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1778
2. Energy Consumption.
Whenever a node transmits data to other node/base
station it consumes some energy.
Fig. 8 The simulation of the data transmission using
normal protocol
Fig. 9 The simulation of the data transmission using
2Head-LEACH protocol.
The above fig 8&9. Clearly shows that the data
transmission by normal protocol is more than the data
that is transmitted using leach protocol.
Fig. 10 Energy consumption using normal protocol
Fig. 11 Energy consumption using normal protocol 2Head-
LEACH protocol
The above Fig 10&11 clearly shows that the energy
consumedduringtransmissionofdata usingnormal protocol
is more than that consumed by leach protocol
7. CONCLUSION
This paper proposes an energy balance algorithm and a
technique to transmit data securely on the basis of
traditional LEACH protocol and RC-6 algorithm. This
algorithm comprehensively considers the residual energy
and distance factors which improves cluster-head election
and the strategy of non-cluster head node selecting the
optimal cluster-head. As it is proved in the simulation result,
the improved algorithm can effectively balance the network
energy consumption, heighten system data transmission,
and prolong the nodes and network life.
ACKNOWLEDGMENT
We would like to thank Vorugunti Chandra Sekhar, rudula
Sarvabhatla, for their help concerning the enhancement of
cryptographic techniques over wireless sensor network(WSN).
REFERENCES:
1) Feng Shang, Mehran Abolhasan, Tadeusz Wysocki.
An Energy-Efficient adaptive Clustering Algorithm
for Wireless Sensor Networks.International Journal
of Information Acquisition, 2009, 6(2): 117-126.
2) Handy MJ, Hasse M, Timmermann D. Low energy
adaptive clustering hierarchy with deterministic
cluster-head selection [C] Proc of the 4th IEEEConf.
on Mobile and Wireless CommunicationsNetworks.
Stockholm, 2002:368-372.
3) Jaydeep Sen, “A survey on Wireless Sensor netwrok
Security”, Technical Report 55-77, International
Journal of Coomunication Netwroks and
Information Security (IJCNIS) Vol 1, No2 August
2009.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1779
4) Manjeshwar A, Grawal D.P. TEEN: A protocol for
enhanced efficiency in wireless
sensornetworks[C].Proceeding of the 15th Parallel
and Distributed Processing Symp. San francisoi,
2001: 2009-2015.
5) Lindsey S, Raghavenda CS. PEGASIS:Power efficient
gathering in sensor information systems[C].
Proceeding of the IEEE AerospaceConf.NEW YORK,
2002: 1125-1130.
6) Younis O, Fahmy S. HEED: A hybrid, energy-
efficient, distributed clustering approachforad-hoc
sensor networks [J]. IEEE Trans. On Mobile
Computing.2004, 3(4):660-669.
7) LI-Qing GUO, YI XIE*, CHEN-HUI YANG and ZHENG-
WEI JING: Improvement on LEACH by combining
Adaptive Cluster Head Election and Two-hop
transmission,[J]. Proceeding of the Ninth
International Conference on Machine Learning and
Cybernetics, Qingdao, July 2010, pp: 1678-1683.
8) Jochen Furthm¨uller, Stephan Kessler, and Oliver P.
Waldhorst “Energy-efficient Management of
Wireless Sensor Networks” The Seventh
International Conference on Wireless On-demand
Network Systems and Services IEEE/IFIP WONS
2010.
9) Farhana Ashraf, Riccardo Crepaldi and Robin H.
Kravets University of Illinois at Urbana-Champaign
“Synchronization vs. Signaling: Energy-Efficient
Coordination in WSN” IEEE/2010
10) kai zeng, kannan govindan, and prasant mohapatra,
university of california, davis“non-cryptographic
authentication and identification in wireless
networks” IEEE wireless communications -October
2010.
AUTHOR
The author#, Miss Prajwali Wamanrao Gawande was born
on 20 January 1990.she has completed his B.E from
Amaravati University and is currently pursuing M.E from
Nagpur University. Her research interest is Wireless Sensor
Network and Security.

Weitere ähnliche Inhalte

Was ist angesagt?

Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocolzhendong
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET Journal
 
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET Journal
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocolijceronline
 
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...IRJET Journal
 
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...Al Imran, CISA
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksIRJET Journal
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIAEME Publication
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...IRJET Journal
 
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...IJCSIT Journal
 
Hierarchical clustering algo for wsn
Hierarchical clustering algo for wsnHierarchical clustering algo for wsn
Hierarchical clustering algo for wsnSamruddhi Gaikwad
 
Data Collection Method to Improve Energy Efficiency in Wireless Sensor Network
Data Collection Method to Improve Energy Efficiency in Wireless Sensor NetworkData Collection Method to Improve Energy Efficiency in Wireless Sensor Network
Data Collection Method to Improve Energy Efficiency in Wireless Sensor NetworkKhushbooGupta145
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksPushpita Biswas
 
RITISH AGGARWAL
RITISH AGGARWALRITISH AGGARWAL
RITISH AGGARWAL9914814928
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKijngnjournal
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNIJCNCJournal
 

Was ist angesagt? (20)

Leach-Protocol
Leach-ProtocolLeach-Protocol
Leach-Protocol
 
Kianoosh&amp;sajjad
Kianoosh&amp;sajjadKianoosh&amp;sajjad
Kianoosh&amp;sajjad
 
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...IRJET-	 Chaos based Secured Communication in Energy Efficient Wireless Sensor...
IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor...
 
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
IRJET- Sink Mobility based Energy Efficient Routing Protocol for Wireless Sen...
 
Enhanced Leach Protocol
Enhanced Leach ProtocolEnhanced Leach Protocol
Enhanced Leach Protocol
 
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...
 
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor  N...
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
 
B045070510
B045070510B045070510
B045070510
 
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORKIMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
IMPROVEMENT OF LEACH AND ITS VARIANTS IN WIRELESS SENSOR NETWORK
 
20320130406029
2032013040602920320130406029
20320130406029
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
 
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
 
Hierarchical clustering algo for wsn
Hierarchical clustering algo for wsnHierarchical clustering algo for wsn
Hierarchical clustering algo for wsn
 
Data Collection Method to Improve Energy Efficiency in Wireless Sensor Network
Data Collection Method to Improve Energy Efficiency in Wireless Sensor NetworkData Collection Method to Improve Energy Efficiency in Wireless Sensor Network
Data Collection Method to Improve Energy Efficiency in Wireless Sensor Network
 
Energy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networksEnergy efficient communication techniques for wireless micro sensor networks
Energy efficient communication techniques for wireless micro sensor networks
 
RITISH AGGARWAL
RITISH AGGARWALRITISH AGGARWAL
RITISH AGGARWAL
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
 
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSNOptimized Cluster Establishment and Cluster-Head Selection Approach in WSN
Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN
 

Ähnlich wie Enhancing Data Transmission and Protection in Wireless Sensors

INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...ijsrd.com
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Networkijsrd.com
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...IRJET Journal
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Networkjosephjonse
 
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...IRJET Journal
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...ijsrd.com
 
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...IRJET Journal
 
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSNIRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSNIRJET Journal
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Editor IJCATR
 
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...IRJET Journal
 
Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...
Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...
Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...IJEEE
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSijassn
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksijassn
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Publishing House
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Journals
 
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...IJERA Editor
 
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityComparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityIRJET Journal
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...IJSRED
 
K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement IJECEIAES
 

Ähnlich wie Enhancing Data Transmission and Protection in Wireless Sensors (20)

INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
Optimizing the Performance of I-mod Leach-PD Protocol in Wireless Sensor Netw...
 
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor NetworkReview of Various Enhancements of Modified LEACH for Wireless Sensor Network
Review of Various Enhancements of Modified LEACH for Wireless Sensor Network
 
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
 
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
IRJET- An Efficient Dynamic Deputy Cluster Head Selection Method for Wireless...
 
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
Improved Performance of LEACH for WSN Using Precise Number of Cluster-Head an...
 
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
 
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSNIRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
 
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
Improvement In LEACH Protocol By Electing Master Cluster Heads To Enhance The...
 
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
 
Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...
Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...
Chain Based Wireless Sensor Network Routing Using Hybrid Optimization (HBO An...
 
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKSENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
ENERGY EFFICIENT DATA COMMUNICATION APPROACH IN WIRELESS SENSOR NETWORKS
 
Energy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networksEnergy efficient data communication approach in wireless sensor networks
Energy efficient data communication approach in wireless sensor networks
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
 
Comparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and ConnectivityComparison of Energy Efficient WSN in Coverage and Connectivity
Comparison of Energy Efficient WSN in Coverage and Connectivity
 
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
Enhanced Routing and Cluster Based Algorithms in WSNs to Improve Communicatio...
 
K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement K-means clustering-based WSN protocol for energy efficiency improvement
K-means clustering-based WSN protocol for energy efficiency improvement
 

Mehr von IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

Mehr von IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Kürzlich hochgeladen

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 

Kürzlich hochgeladen (20)

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 

Enhancing Data Transmission and Protection in Wireless Sensors

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1774 Enhancing Data Transmission and Protection in Wireless Sensor Node Prajwali wamanrao Gawande1, Prof. Vijay Bagdi2 1Department of Computer Science and Engineering Abha Gaikwad Pati College of Engineering Nagpur, Maharashtra, India 2Department of Computer Science and Engineering Abha Gaikwad Pati College of Engineering Nagpur, Maharashtra, India ------------------------------------------------------------------------***------------------------------------------------------------------------- Abstract - In order to discover physical or environmental conditions, such as sound, temperature, pressure, etc. and to send their data through the network to the main location, a wireless sensor network (WSN) is used since it has many independent sensors. With the management requests and responses and the data issuing from the network’s actual sensing application additional traffic is created. By sending and processing the data together the system’s energy can be reduced, instead of performing the operations individually. The primary objectives of the routing protocol which is designed in wireless sensor network are energy consumption, balancing the network and extending the network’s lifetime. In this paper, we have also proposed the technique for increasing the efficiency of a node aswellasprovidingsecurity to the data and we have also discussed the problems of transmitting data over wireless sensor network Key Words: Wireless Sensor network, Nodes, LEACH, Clustering, cluster-head, RC-6 1. INTRODUCTION A self-organized network composed by a largenumber of micro sensors that are randomly deployed in monitoring region through wireless communication is known as Wireless sensor network [1]. Energy-efficient mechanism is important because each sensor node in wireless sensor network has a constraint energy capacity. In wirelesssensor network, the highest priority should be given to sending packets from the source node to the destination node rather than sensing an event. A typical node (Berkeleynode)havea configurationof8-bitCPU(4MHz),128KBflash,4KBRAMand Transmission range of 100 Feets [3]. In WSN the nodes are made up of electronic devices that which can sense, compute and transmit data from physical environments. Limited energy resources have been comprised by these sensor nodes. To extend the lifetime of network, energy resources for wireless sensor networks should be managed wisely. Transmitting data over the WSN securely is the another problem in WSN. 1.1 Efficiency of node:- Energy wastage, in wireless communications shortens the network lifetime. Major reasons of energy wastage are as follows  Idle listening: - Idle listening happens whenthe radiois listening to the channel to receive the possible data which is not sent.  Collisions: - Collision occurs when two nodes transmit at the same time and interfere with each other.  Control:-Control deals with packet overhead for protocols to exchange required information.  Overhearing: - Overhearing occurs whena sensornode receives packets that are not destined to it. This is the dominant factor of energy wastage, when traffic load is heavy and node density is high. This paper is organized as follows detailed description on Leach protocol is given in Section 2 gives, Section 3 givesthe improvement in leach protocol in order to increase the efficiency of node, Section 4 gives the algorithm used to retain security, Section 5 gives the output obtained by using leach protocol and RC-6, Section 6 gives the comparison of data transfer over WSN using proposed methodandexisting method, Section 7 discusses the conclusion. 2. LEACH PROTOCOL 2.1 Protocol Description In WSN, LEACH is theearliest proposedsingle-hopclustering routing protocol. It can save network energy greatly compared with the non-cluster routing algorithm. Many other clustering algorithm are proposed based on LEACH, such as TEEN (Threshold Sensitive Energy Efficient Sensor Network Protocol)[4]PEGASIS(PowerEfficientGatheringin Sensor Information Systems) [5] HEED (Hybrid Energy- Efficient Distributed Clustering) [6] and so on. All clusters are self-organized in LEACH protocol; each cluster contains several non-cluster head nodes and a cluster-head. The cluster-head node consumes more energy than non-cluster head nodes. In order to balance network energy consumption and prolong the network life cycle, it selects cluster head randomly and each node has an equal chanceto be the cluster-head [7]. The cluster structure update constantly in operation and one updating processis calleda Round. The cycle of each round contains two stages: set-up phase and steady-state phase, set-up phase is the establishment phase of the cluster whereas steady-state phase is the stable data transfer phase. InSet-upphase, each node generates a random number from 0 to 1,andcompares this number with the threshold value T (n). If the number is less than T (n), the no of node is selected as a cluster-head; the threshold T (n) i set in the following manner: - s
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1775 Where n refers the identification of node in the current sensor network; p is the percentage of cluster-heads; r is the current round number; G is the set of nodes that have not been elected as cluster-head in the last 1/p rounds. Once the cluster-head is calculated, the cluster-head sendsa broadcast message to the network and declares itself as the cluster-head. Each normal node decideswhichclusterto join in according to the signal strength of the received message and then sends a request message to the corresponding cluster-head. The cluster-head receives all the messageswhicharesent by the nodes that are willing to join in the cluster. LEACH protocol has a relatively better function in energy consumption through dynamic clustering, keeping the data transmission in cluster which reduces the energy consumption through communicating directly between nodes and the base station, but there are still a lot of inadequacies. The mechanism of cluster-head rotation is used in LEACH protocol. The cluster-head is elected randomly. After multiple rounds of data transmission, the residual energy of the nodes will have a great difference. The nodes or the cluster-head which are far from the base station will consume more energy in transmitting the data of the same length relatively. After that, if they are selected as cluster- heads, they will run out of energy and become invalid.Asthe number of invalid nodes increases,it’ll havea greatinfluence in the network performance and reduce the life of the network. On the basis of received signal intensity to join, Cluster member nodes selects the optimal cluster-head. Neither consider the distance fromthe nodeitselftothebase station nor the distance between cluster-head and the base station. So normal node may choose the cluster-head that is far from base station as its optimal cluster-head, this not only is the heavy burden to the cluster-head but also increases the extra energy consumption, which is not beneficial to balance network energy consumption. 3. IMPROVEMENT OF THE LEACH PROTOCOL This paper considers node energy and position information to improve the LEACH algorithm,energybalancedclustering algorithm named 2Head-LEACH algorithm to improve the energy of the node is proposed here. Cluster-head Selection Based on residual energy, there are many improved methods of the cluster-head selectionthethreshold equation in [2] is as follows Ecur is the current energy of node. E0 is the initial energy of the node. In this improvement the current energy is taken into consideration, and increases the probabilityofthehigh- energy nodes to become cluster-head, but there is also a significant problem. When the remaining energy of a node is very less than threshold value, the threshold T (n) becomes very small, the probabilityof thenode random numberbeing smaller than the threshold becomes small, the cluster-head nodes in the network will be too little, because of the untimely death, the selected cluster-head consumes too much energy and thus affects the network life. The above method doesn’t consider the influence of the distance between nodes and the base station in electing cluster-head. In this paper, instead of threshold value weareselectingtwo cluster-head by comparing their energies. In normal leach protocol, there is only single cluster-head and it depends upon threshold value after sending a data node losses some energy so it again apply algorithm to find new cluster head. Hence transmission delay is being caused. In proposed technique there are two cluster-head if one goes down second take its position. By using 2Head- LEACH algorithm much energy can be saved and transmission delay can be reduced. Example: - When it transmits data to another node. If we have a WSN With the 100 nodes we divide that100nodeinto thenumber of clusters say four. i.e.; each cluster contains 25 nodes. Now we compare the energy of nodes with another node in the same cluster. So we get max energy node. We consider it as cluster-head-1 and applysameprocesstofindsecondcluster head-2. Perform the same operation for all the remaining clusters IV. SECURITY Low power design is the basic nature of WSN, which forces security mechanisms to fit under very limiting processing and bandwidth constraints, hence security to data, has been the challenging issue. The security requirements in WSN are the authentication of entity, message, data,especiallyindata critical applications. It is observed in [8] that due to Sensor Node Constraints and Networking Constraints in WSN’s. Most of the protocols [9][10] are based on Symmetric key cryptography. We believe that RC6 is well-suited to meet all of the requirements of the Advanced Encryption Standard.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1776 Details of RC6 Like RC5, RC6 is a fully parameterized family of encryption algorithms. A version of RC6 is more accurately specified as RC6-w/r/b where the word size is w bits, encryption consists of a nonnegative number of rounds r, and b denotes the length of the encryption key in bytes. Since the AES submission is targeted at w = 32 and r = 20, we shall use RC6 as shorthand to refer to such versions. When any other value of w or r is intended in the text, the parameter values will be specified as RC6-w/r. Of particular relevance to the AES effort will be the versions of RC6 with 16-, 24-, and 32-byte keys. For all variants, RC6-w/r/b operates on units of four w-bit words using the following six basic operations. The base-two logarithm of w will be denoted by lgw. a + b integer addition modulo 2w a - b integer subtraction modulo 2w bitwise exclusive-or of w-bit words integer multiplication modulo 2w . a<<<b rotate the w-bit word a to theleftbytheamountgiven by the least significant lgw bits of b. a>>>b rotate the w-bit word a to the right by the amount given by the least significant lgw bits of b. The following figure shows the encryption and decryption algorithm of RC-6. Fig 1:- Encryption with RC-6 Fig 2:- Decryption with RC-6 It consists of six additions, two exclusive-ors, two squaring, two left-rotates by five bits, and two left-rotates by a variable quantity r. Note that we have counted B _ (2B + 1) = 2B2 + B as a squaring and two additions. These basic operations can be implemented on an 8-bit processor in the following way (ignoring addressing instructions): 1. A 32-bit addition can be computed using four 8-bit additions with carry (ADDC). 2. A 32-bit exclusive-or can be computed using four8- bit exclusive-ors (XRL). 3. A 32-bit squaring can be computed using six 8-bit by 8-bit multiplications (MUL) andelevenadditions with carry (ADDC). Note that six multiplicationsare enough since we only need the lower 32 bits of the 64-bit product. 4. Rotating a 32-bit word left by five bit positions can be computed by rotating the word right by one bit position three times and then permuting the four bytes. Note that rotating the word right by one bit position can be done using four byte rotations with carry (RRC). 5. Rotating a 32-bit word left by r can be computed by rotating the word left or right by one bit position r0 times (r0 _ 4, with average two) andthenpermuting the four bytes appropriately. The five least- significant bits of r are used to determine r0andthe permutation which can be controlled using jumps (JB). 6. Most instructions take one cycle except that MUL takes four cycles and JB takes two cycles. Putting things together, we can estimatethetotal numberof cycles needed for one round of RC6.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1777 5. OUTPUT If you want to send the data from node 1 to 14. Fig 3:- By using Leach and RC-6 Fig 4:- node 2 is cluster head of 1st cluster Fig 5:- node 8 is cluster head on 2nd Fig 6:- node 13 is cluster head of 3rd head. Fig 7:- data reach to node 14. 6. COMPARISON This section deals with comparing energy efficient data transfer securely over WSN by leachprotocol andbyexisting methods. We compare this protocol on following parameters. 1. On Transmission Delay. Transmission delay (or store-and-forward delay, also known as packetization delay) is the amount of time required to push all of the packet's bits into the wire. In other words, this is the delay caused by the data-rate of the link. Transmission delay is a function of the packet's length and has nothing to do with the distance between the two nodes. This delay is proportional to the packet's length in bits.
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1778 2. Energy Consumption. Whenever a node transmits data to other node/base station it consumes some energy. Fig. 8 The simulation of the data transmission using normal protocol Fig. 9 The simulation of the data transmission using 2Head-LEACH protocol. The above fig 8&9. Clearly shows that the data transmission by normal protocol is more than the data that is transmitted using leach protocol. Fig. 10 Energy consumption using normal protocol Fig. 11 Energy consumption using normal protocol 2Head- LEACH protocol The above Fig 10&11 clearly shows that the energy consumedduringtransmissionofdata usingnormal protocol is more than that consumed by leach protocol 7. CONCLUSION This paper proposes an energy balance algorithm and a technique to transmit data securely on the basis of traditional LEACH protocol and RC-6 algorithm. This algorithm comprehensively considers the residual energy and distance factors which improves cluster-head election and the strategy of non-cluster head node selecting the optimal cluster-head. As it is proved in the simulation result, the improved algorithm can effectively balance the network energy consumption, heighten system data transmission, and prolong the nodes and network life. ACKNOWLEDGMENT We would like to thank Vorugunti Chandra Sekhar, rudula Sarvabhatla, for their help concerning the enhancement of cryptographic techniques over wireless sensor network(WSN). REFERENCES: 1) Feng Shang, Mehran Abolhasan, Tadeusz Wysocki. An Energy-Efficient adaptive Clustering Algorithm for Wireless Sensor Networks.International Journal of Information Acquisition, 2009, 6(2): 117-126. 2) Handy MJ, Hasse M, Timmermann D. Low energy adaptive clustering hierarchy with deterministic cluster-head selection [C] Proc of the 4th IEEEConf. on Mobile and Wireless CommunicationsNetworks. Stockholm, 2002:368-372. 3) Jaydeep Sen, “A survey on Wireless Sensor netwrok Security”, Technical Report 55-77, International Journal of Coomunication Netwroks and Information Security (IJCNIS) Vol 1, No2 August 2009.
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 12 | Dec 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1779 4) Manjeshwar A, Grawal D.P. TEEN: A protocol for enhanced efficiency in wireless sensornetworks[C].Proceeding of the 15th Parallel and Distributed Processing Symp. San francisoi, 2001: 2009-2015. 5) Lindsey S, Raghavenda CS. PEGASIS:Power efficient gathering in sensor information systems[C]. Proceeding of the IEEE AerospaceConf.NEW YORK, 2002: 1125-1130. 6) Younis O, Fahmy S. HEED: A hybrid, energy- efficient, distributed clustering approachforad-hoc sensor networks [J]. IEEE Trans. On Mobile Computing.2004, 3(4):660-669. 7) LI-Qing GUO, YI XIE*, CHEN-HUI YANG and ZHENG- WEI JING: Improvement on LEACH by combining Adaptive Cluster Head Election and Two-hop transmission,[J]. Proceeding of the Ninth International Conference on Machine Learning and Cybernetics, Qingdao, July 2010, pp: 1678-1683. 8) Jochen Furthm¨uller, Stephan Kessler, and Oliver P. Waldhorst “Energy-efficient Management of Wireless Sensor Networks” The Seventh International Conference on Wireless On-demand Network Systems and Services IEEE/IFIP WONS 2010. 9) Farhana Ashraf, Riccardo Crepaldi and Robin H. Kravets University of Illinois at Urbana-Champaign “Synchronization vs. Signaling: Energy-Efficient Coordination in WSN” IEEE/2010 10) kai zeng, kannan govindan, and prasant mohapatra, university of california, davis“non-cryptographic authentication and identification in wireless networks” IEEE wireless communications -October 2010. AUTHOR The author#, Miss Prajwali Wamanrao Gawande was born on 20 January 1990.she has completed his B.E from Amaravati University and is currently pursuing M.E from Nagpur University. Her research interest is Wireless Sensor Network and Security.