Optimizing Security in LEACH-based WSN Using Advanced n-RSA Encryption
Keywords:
WSN, SecurityAbstract
Wireless sensor networks (WSNs) have had a lot of problems up until now because they are open, adaptable, and limited in resources. These problems have included privacy, effectiveness, and consumption of energy. Sensitive information should always be transmitted over wireless networks with extreme caution because public communications on these networks are sometimes unreliable. Although many applications may be handled by hierarchical routing methods, there are difficult problems with cluster head (CH) selection and network overload distribution. The Secure LEACH Protocol-based Cryptographic n-RSA method (SLEACH-n-RSA) is introduced in the suggested strategy to improve network longevity, reduce energy consumption, and guarantee a high degree of security. The initial step of the SLEACH-n-RSA protocol is to use the improved LEACH protocol, which is based on the estimated remaining energy (ERE) and depleted energy (DE) for setting the threshold function value that will decide who will be the cluster head and how the cluster will form. In the second step, the suggested n-RSA encryption algorithm has been used to ensure the confidentiality of the transmitted data. The performance analysis of the proposed SLEACH-n-RSA protocol shows better performance results when compared with other currently used protocols in terms of NW lifetime, Packet Delivery Ratio (PDR), energy consumption, and execution time.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Journal of Soft Computing and Data Mining

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.









