Optimizing Security in LEACH-based WSN Using Advanced n-RSA Encryption

Authors

Keywords:

WSN, Security

Abstract

Wireless sensor networks (WSNs) have had a lot of problems up until now because they are open, adaptable, and limited in resources. These problems have included privacy, effectiveness, and consumption of energy. Sensitive information should always be transmitted over wireless networks with extreme caution because public communications on these networks are sometimes unreliable. Although many applications may be handled by hierarchical routing methods, there are difficult problems with cluster head (CH) selection and network overload distribution. The Secure LEACH Protocol-based Cryptographic n-RSA method (SLEACH-n-RSA) is introduced in the suggested strategy to improve network longevity, reduce energy consumption, and guarantee a high degree of security. The initial step of the SLEACH-n-RSA protocol is to use the improved LEACH protocol, which is based on the estimated remaining energy (ERE) and depleted energy (DE) for setting the threshold function value that will decide who will be the cluster head and how the cluster will form.  In the second step, the suggested n-RSA encryption algorithm has been used to ensure the confidentiality of the transmitted data.  The performance analysis of the proposed SLEACH-n-RSA protocol shows better performance results when compared with other currently used protocols in terms of NW lifetime, Packet Delivery Ratio (PDR), energy consumption, and execution time.

Downloads

Download data is not yet available.

Author Biographies

  • Dr. Ruwaida Mohammed yas, Information Institute for Postgraduate Student Iraqi Commission for Computers and Informatics

    computer science

  • Dr. Sanaa Ahmed Kadhim1, University of information technology and communications,

    computer science

  • Dr. Saad Abdual Azize Abdual Rahman, Almamoon university collage

    computer science

Downloads

Published

18-12-2024

Issue

Section

Articles

How to Cite

Yas, R. M. ., Ahmed , S. ., Abdual Azize, S. ., & Musa , M. . (2024). Optimizing Security in LEACH-based WSN Using Advanced n-RSA Encryption. Journal of Soft Computing and Data Mining, 5(2), 52-61. https://penerbit.uthm.edu.my/ojs/index.php/jscdm/article/view/19023