International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 111

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 11, November 2014


A Survey Framework on Energy Efficient and Secure Routing Protocol in WSN

Penumolu. Ratnakumari | M. Koteswara Rao


Abstract: WSN-Wireless sensor networks are facing many challenges such as the limited resource in processing power, storage and energy. The limited energy resource is one of the main challenges facing the security in such networks. This paper aims to improve the current security mechanisms in wireless sensor networks as well as reducing power consumption. LEACH protocol provides an energy routing protocol. However, it doesnt cover the security problems. Alternatively, this paper aims to provide an improved secure and more energy efficient routing protocol called LS-LEACH (Lightweight Secure LEACH). Authentication algorithm is integrated to assure data integrity, authenticity and availability. Furthermore, this paper shows the improvement over LEACH protocol that makes it secure and how to make it more energy efficient to reduce the effect of the overhead energy consumption from the added security measures.


Keywords: attacks, wireless sensor, energy efficient, sensor security


Edition: Volume 3 Issue 11, November 2014,


Pages: 2648 - 2653


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Penumolu. Ratnakumari, M. Koteswara Rao, "A Survey Framework on Energy Efficient and Secure Routing Protocol in WSN", International Journal of Science and Research (IJSR), Volume 3 Issue 11, November 2014, pp. 2648-2653, https://www.ijsr.net/get_abstract.php?paper_id=18111402

Similar Articles with Keyword 'attacks'

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar | Mohan K [18]

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 629 - 634

A Face Spoof Detection using Feature Extraction and SVM

Lovely Pal [2] | Renuka Singh [2]

Share this Article
Top