SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 742
Chaos based Secured Communication in Energy Efficient Wireless
Sensor Networks
Nidarsh M P1, Mrs. G Padmaja Devi2
1 PG Scholar, Dept.of E&C, Malnad college of engineering, Karnataka, India
2 Associate Professor, Dept.of E&C, Malnad college of engineering, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Wireless sensor networks has a important role in
recent network technology, WSN which contains number of
sensor nodes used to monitor physical and environmental
condition such as temperature, sound, vibration, pressure,
humidity, motion or pollutants, further it sends their data
through the network to main location. Some of the sensor
nodes are furnished with supported battery power through
which it can furnish ample of operation and it can also
communicate with other nodes. Increasing the lifetime of the
wireless sensor network, power management part is essential
for improving the performance of WSN. This paper proposesa
chaotic encryptionwithclusteredLowEnergyAdoptiveCluster
Head (LEACH) algorithm for wireless energy efficient
networks which also reduces the consumption in WSN. The
performance of the proposed work is evaluated and
comparison is done.
Key Words: WSN, LEACH, Energy efficiency, network
lifetime, chaotic encryption.
1. INTRODUCTION
Wireless Sensor Network is a type of network which self-
organizes with a huge number of small sensors. The main
aim of sensor node is to complete the packet transmission
among itself within the network area, whichcanidentifyand
notice the physical entity of real world environment. WSN
contain of various number of sensor nodeswhichcanfurther
sense their locality and contact among themselves. Main
characteristics of WSN nodes are contains tiny size,
reasonable cost, lessconsumptionofpower,multi-functional
such as it can perform sensing ,data processing, routing and
communicate easily in short distances. Inabandonedhostile
regions, these devices are implemented in general, but it
becomes difficult to recharge the power source.
With the help of multiple clusters,sensor nodesaredesigned
and organized in a proper manner. The cluster head is
selected by several group of nodes,hereeachand everynode
can act has part of message transfer in between multiple
nodes. At last, all nodes will go for sharing messages to base
station by cluster head. Sensornetworksalwayspreferredto
use cluster design, this in turn help us to capture for data
gather and fusion operations by each of sensor nodes. It
exchange message with cluster head which is going to send
message to its nearest base station. The following figure 1
shows actual formation of cluster heads and selection of
those are independent to each other.
Fig -1: Cluster formation
In current situation of WSN correct use of battery power is
not up to the mark, due to which there will be dissimilarity
while sending the message to destination node from source
node. So multi hop communication plays a major role as a
part of its requirements. Sometimes it’s preferred to use
hierarchical routing during data transmission in order to
improve sensor network lifetime. Cluster can be made by
collecting group of nodes which helps to build hierarchical
routing and cluster head to be selected by every clusterinits
corresponding network. As a part of data transmission,
cluster head liable for data collection from adjacent nodes
and base station will go for receiving data.
2. RELATED WORK
WSN facing its own challenges and issues can be identified
by the researchers. To improve the network life time, many
protocols have been followed. Here [1] introduced the
protocol called Low Energy Adoptive Cluster Head [LEACH].
Hence it help us to get improved the energy performance of
network. Drawback here is that the performance is notupto
the mark D.Aradhana, NagaveniB.BiradarandK.LingaRaj[2]
proposed the novel method to get more number of clusters
from the network. Here, they were using mobileagentsfrom
every cluster for sending data to cluster head instead of
choosing nodes. These mobilenodeswill collectdata from all
the nodes belong to network with that aggregation of data
can be performed. The aggregated data will be received by
the base station. The two components play a major role in
this method, such as group array and ordinal array.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 743
Clustering has been broadly considered in the network
literature as well as in information processing [3–5].
N Eghbali [6] deals with nodes are facing problems like lack
of unique address in sensor network and it is most
important for collecting information from the sensors. Once
the nodes have got dispersed, accesses to corresponding
nodes get delayed. The nodes present in the network will
become useless and leads to decay behind the obtained
energy gets over. Hence the issues related to energy
consumption and optimization isa greaterchallengefacedin
real time network applications.Recentlylotsmorehavebeen
appreciated towards it. D. T. Ho, T. A. Johansen, J. B. D. Sousa,
E. I. Grøtli and P. B. Sujit, [7], done a comparison with earlier
papers, this paper have an enhanced method. First of all
using a special scheme called PSO and its get modified with
optimal path selection for relay data. This paper uses a
mixture of two multiple access methods to achieve
communication such as TDMA and CSMA/CA and
performance comparison can be done in better way.
Prof. Rajeev Vishwakarma, Apurva Bhalerao [8] discussed
the concept of gaining reliability andenergyconsumption by
doing setup of wireless sensor network in simulation. Based
on some parameters of WSN, deciding the network stability
in terms of energy and its existence. The particle swarm
optimization is taken into consideration for optimizing the
update time and hop distance. In order to improve the
performance of WSN, the following parameters to be
considered such as transmission power, used frequency,
modulation technique and so on. NING WANG, WEI XIANG
AND YUAN ZHOU, (Senior Member, IEEE) [9] illustrate the
new method for to extend the lifetime of network using
advanced particle swarm optimization algorithm. This is
used to choose target nodes as a processofoptimization. The
set of rules formed to get better results for parameters like
transmission distance and energy efficiency. This paper
proposes a distributed sensor in better way and balanced
system for clusters to enhance the network lifetime. In early
days, optimal cluster layout can be obtained by applying
several fitness functions with the use of PSO [10-12].
Wireless sensor network is have some clustering problems,
PSO act has a solution to those problems by embedding it
into some other algorithms [13]. Alaa SHETA, Basma Fathi
SOLAIMAN [14] addressed the WSN problem facing to use
energy resources efficiently and minimizing traffic during
transmission by applying balanced load distribution. To
solve this type of problem, proposed a new way of finding
optimal distribution of cluster heads and sensors. Hence,
consumption of energy inversely proposed to lifetime of
network. This paper comes with the idea of introducing
hybrid cluster algorithm with the help of particle swarm
optimization and K-means clustering.
3. METHODOLOGY
Cluster head selection algorithm:
Step-1: Create Sensor Network Model.
Step-2: Assign initial energy to sensor nodes.
Step-3: Sort the nodes based on the distance from Base
station.
Step-4: For round=1 assign cluster heads based on minimum
distance from the base-station.
Step-5: Continue step-4 for allotted number of round and
corresponding cluster heads get selected.
3.1 LEACH PROTOCOL
LEACH is network protocol and much essential to
use. Since some nodes present in network is not at all useful
when the battery dies. The LEACH protocol let us to find out
the nodes lifespan and permitting to do minimal work it
essentially used for data transmission
Fig -2: Direct v/s Minimum transmission
The energy used in direct transmission can be modeled by
dk(3d1+d2)2
Whereas energy used for minimum transmissioncanalsobe
modeled using
dk(3d12+d22)
Where d is energy dissipation
k is length of message in bits
Usually LEACH network is having two different stages
such as set-up stage and steady stage. The set-up stage is
meant for cluster heads selection and steady stage is used to
maintain the cluster heads when the transmission of data is
happening among nodes within the network. The Figure4
shows clear cut idea about using LEACH protocol by
comparing with other cases. Here, second gives better
arrangement since the network is accurately sectioned and
neatly spaced out the cluster heads.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 744
Fig -3: LEACH v/s bad-case scenario
3.2 CHAOTIC CRYPTOGRAPHY
3.2.1 Two Dimensional Logistic Map
The two dimensional logistic map is well known for
its complicated chaotic behavior when compared to the one
dimensional logistic map. It takes the input , and in a
plane and maps it to a new point. Mathematically it can be
defined as
(1)
(2)
Where is the system parameter , are the pair wise
points. The map depends on three values namely ,
and whose corresponding initial values are r =1.19 ,
and .
3.2.2 Three Dimensional Lorenz Map
The Lorenz equation can be represented in
differential equations having chaotic behavior for certain
parameters with initial conditions. Mathematically it can be
defined as
(3)
(4)
(5)
The System exhibits chaotic behavior when the parameters
are having values , and
Table -1: Network Security Initial Conditions Parameters
3.2.3 Encryption Scheme
The proposed algorithm consists of two phases. The
first phase includes Confusion which scramblesthedata and
the second phase includes Diffusion which modifiesthedata
based on the chaotic sequences.Theproposedcryptosystem
is shown in Fig 1.
Fig -4: Network Encryption Scheme
Chaotic Maps Initial Conditions
2D Logistic Map
= 0.1
= 0.1
3D Lorenz Map
= 0.1
= 0.1
s=10
b=8/3
Input
Node
Informa
tion
Sequence
Key
1
Conf
usion
Diffu
sion
Encry
pted
Data
Key
2
Sequence
Logistic
Map
Lorenz
Map
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 745
3.2.4 Confusion
For a byte level confusion is done by interchanging the
positions of the information based on the chaotic sequence
generated by 2D logistic map.
The Nodal information X (row matrix) of size 1xN is takenas
input for confusion.
The chaotic sequence are generated by 2D logistic map and
arrange them in a row matrix of size Mx1. Sort the obtained
chaotic sequence in the ascendingorderandtheindexvalues
are obtained in L1.
The rows of matrix X are shuffled based on the index values
of L1 to achieve matrix Y.
3.2.5 Diffusion
Diffusion includes logical XOR operation between the
confused data Y and the matrix containing the chaotic
sequences obtainedfromthe three-dimensional Lorenzmap.
Generate chaotic sequences from the three-dimensional
Lorenz map.
Convert the obtained sequences into integer value ranges
from 0 to 255 and store them in a matrix Z1.
Logical XOR is performed between confused data Y with the
matrix obtained from Lorenz map Z1 to achievematrixH1 of
size 1xN.
The obtained encrypted matrix H1 is ready to transfer over
the network.
Fig -5: Block diagram of the proposed encryption
technique
3.3 LIFE TIME OF THE CHAOS NETWORK
The proposed research work is further extended to
evaluate the life time of the network. It includes energy
conservation in each and every sensor node by makes use of
clustering and supporting cluster head selection energy
optimization algorithm. The supporting cluster head is
chosen based on residual energy. To increase the WSN
lifetime, energy optimization techniques and energy
conservation measures are enhanced.
Parameters Initial Values
Number of Nodes 100
Base station Location (100,100)
Packet Length 2000
Initial Energy (E0) 2 Joules
Tx Energy (ETX) 50 x 10-9 Joules
Rx Energy (ERX) 50 x 10-9 Joules
Data Aggregation Energy 5 x 10-9 Joules
Table -2: Energy Efficient Network Parameters
4. RESULTS AND DISCUSSIONS
Fig -6: Distribution of Nodes and Cluster Formation
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 746
Fig -7: Residual Energy versus Number of Iterations
Fig -8: Number of Alive Nodes versus Number of
Iterations
Fig -9: Energy Variance versus Number of Iterations
In order to evaluate the effect of network security on
network life timevariousperformancemetricsaremeasured
and compared with traditional LEACH technique. Residual
Energy is evaluated in Figure 7 for both chaos based
Clustered WSN and traditional LEACH algorithm and it is
shown that Energy reduction is less when compared to
LEACH. Figure 8 shows number of alive nodes when
compared with the LEACH system.
Figure 9 shows Average energy variance of all nodeshasless
significant using proposed chaos based WSN.
5. CONCLUSIONS
The performance of WSN is improved by LEACH based
clustering and cluster head selection method algorithms by
increasing the residual energy,throughput,quantityofactive
nodes and packet delivery ratio. The better clustering
algorithm builds clusters in a centralized manner within a
base station and choice of cluster heads by using LEACH in
dispersed manner. The performance metrics such as
network lifetime, throughput, packet delivery ratio, delay,
normalizedoverhead,total energyconsumptionandresidual
energy are estimated and compared with advanced
clustering methodology. The simulation result shows that
the projected Chaotic Encryption with Clustered LEACH
scheme gives improved performance in order to reduce the
total energy consumption and increasing the lifetime of
WSN.
REFERENCES
[1] Liu, Z., Liu, Z., and Wen, L. (2011). “A leach protocol
for wireless sensor networks. In Advanced
Computational Intelligence (IWACI)”,2011 Fourth
International Workshop on, pages 766-769.
[2] K. LingaRaj, D. Aradhana and Nagaveni B.Biradar,
“Multiple mobile agents in wireless sensor networks
using genetic algorithms”, International Journal of
Scientific and EngineeringResearch,vol3,2012,pp1–
5.
[3] Low CP, Fang C, Mee J, Ang, YH. Load-balanced
clustering algorithms for wireless sensor networks.
In: IEEE International Conference on
Communications; 24–28 June 2007; Glasgow, UK.
New York, NY, USA: IEEE. pp. 3485-3490.
[4] Gavalas D, Mpitziopoulos A, Pantziou G,
Konstantopoulos C. An approach for near-optimal
distributed data fusion in wireless sensor networks.
Wirel Netw 2010; 16: 1407-1425.
[5] Tan R, Xing G, Li, B, Wang J, Jia X. Exploiting data
fusion to improve the coverage of wireless sensor
networks. IEEE/ACM Tr Netw 2012; 20: 450-462.
[6] N.Eghbali,”PerformanceImprovementofInformation
Dissemination Protocols in Sensor Networks
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 747
Through Data Aggregation, Computer Engineering
andInformationTechnologyDepartment”,2007.PP1-
121.
[7] D. T. Ho, E. I. Grøtli, P. B. Sujit, T. A. Johansen, and J. B.
D. Sousa, “Cluster-based communication topology
selection and UAV path planning in wireless sensor
networks,” in Proc. of International Conference on
Unmanned Aircraft Systems (ICUAS). Atlanta, GA,
USA: IEEE, 2013.
[8] Prof. Rajeev Vishwakarma, Apurva Bhalerao,
“Performance of Wireless Sensor Network using
Particle Swarm Optimization Algorithm”,
International Journal of Computer Application
(2250-1797) Volume 6– No.1, January- February
2016.
[9] YUAN ZHOU, (Senior Member, IEEE), NING WANG,
AND WEI XIANG, (Senior Member, IEEE),“Clustering
Hierarchy Protocol in Wireless Sensor Networks
Using an Improved PSO Algorithm”, date of
publication December 1, 2016, date of current
version March 13, 2017.
[10] Latiff N, Tsimenidis C, Sharif B. Energy-aware
clustering for wireless sensor networks using
particle swarm optimization. In: IEEE 18th
International Symposium on Personal, Indoor and
Mobile RadioCommunications;3–7September2007;
Athens, Greece. New York, NY, USA: IEEE. pp. 1-5.
[11] Hou J, Fan X, Wang W, Jie J, Wang Y. Clustering
strategy of wireless sensor networks based on
improved discrete particle swarm optimization. In:
IEEE Sixth International Conference on Natural
Computation; 10–12 August 2010; Yantai, China.
New York, NY, USA: IEEE. pp. 3866-3870.
[12] Kulkarni R, Venayagamoorthy G. Particle swarm
optimization in wireless sensor networks: a brief
survey. IEEE TSyst Man Cy C 2011; 41: 262-267.
[13] KarthikeyanM,VenkatalakshmiK.Energy conscious
clustering of wireless sensor network using PSO
incorporated cuckoo search. In: IEEE Third
International Conference on Computing
Communication Networking Technologies; 26–28
July 2012; Coimbatore, India. New York, NY, USA:
IEEE. pp. 1-7.
[14] Basma Fathi SOLAIMAN,, Alaa SHETA, “Energy
optimization in wireless sensor networks using a
hybrid K-means PSO clustering algorithm”, Turk
Journal of Electrical Engineering & Computer
Science(2016) 24: 2679 – 2695,doi:10.3906/elk-
1403-293.

More Related Content

What's hot

Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routing
Iaetsd Iaetsd
 
RITISH AGGARWAL
RITISH AGGARWALRITISH AGGARWAL
RITISH AGGARWAL
9914814928
 
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SAN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
IJCNCJournal
 
Power Aware Cluster to Minimize Load In Mobile Ad Hoc Networks
Power Aware Cluster to Minimize Load In Mobile Ad Hoc NetworksPower Aware Cluster to Minimize Load In Mobile Ad Hoc Networks
Power Aware Cluster to Minimize Load In Mobile Ad Hoc Networks
IJRES Journal
 

What's hot (20)

Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
Iaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routingIaetsd survey on wireless sensor networks routing
Iaetsd survey on wireless sensor networks routing
 
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
Wireless sensor networks, clustering, Energy efficient protocols, Particles S...
 
RITISH AGGARWAL
RITISH AGGARWALRITISH AGGARWAL
RITISH AGGARWAL
 
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORK
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORKAN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORK
AN ENHANCED HYBRID ROUTING AND CLUSTERING TECHNIQUE FOR WIRELESS SENSOR NETWORK
 
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
International Journal of Advanced Smart Sensor Network Systems ( IJASSN )
 
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
WEIGHTED DYNAMIC DISTRIBUTED CLUSTERING PROTOCOL FOR HETEROGENEOUS WIRELESS S...
 
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless NetworksEnhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
Enhancing Survivability, Lifetime, and Energy Efficiency of Wireless Networks
 
Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for He...
Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for He...Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for He...
Ameliorate Threshold Distributed Energy Efficient Clustering Algorithm for He...
 
BEE BASED ROUTING PROTOCOL FOR MANET
BEE BASED ROUTING PROTOCOL FOR MANETBEE BASED ROUTING PROTOCOL FOR MANET
BEE BASED ROUTING PROTOCOL FOR MANET
 
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
Attaining Augmented Overhaul and Profit Maximization in Cognitive Wireless In...
 
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’SAN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
AN OPTIMUM ENERGY CONSUMPTION HYBRID ALGORITHM FOR XLN STRATEGIC DESIGN IN WSN’S
 
Power Aware Cluster to Minimize Load In Mobile Ad Hoc Networks
Power Aware Cluster to Minimize Load In Mobile Ad Hoc NetworksPower Aware Cluster to Minimize Load In Mobile Ad Hoc Networks
Power Aware Cluster to Minimize Load In Mobile Ad Hoc Networks
 
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor NodeIRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
 
Computing localized power efficient data
Computing localized power efficient dataComputing localized power efficient data
Computing localized power efficient data
 
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKSALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
ALL ABOUT DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
 
Aps 10june2020
Aps 10june2020Aps 10june2020
Aps 10june2020
 
A LOW-ENERGY DATA AGGREGATION PROTOCOL USING AN EMERGENCY EFFICIENT HYBRID ME...
A LOW-ENERGY DATA AGGREGATION PROTOCOL USING AN EMERGENCY EFFICIENT HYBRID ME...A LOW-ENERGY DATA AGGREGATION PROTOCOL USING AN EMERGENCY EFFICIENT HYBRID ME...
A LOW-ENERGY DATA AGGREGATION PROTOCOL USING AN EMERGENCY EFFICIENT HYBRID ME...
 
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
SLGC: A New Cluster Routing Algorithm in Wireless Sensor Network for Decrease...
 

Similar to IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor Networks

J031101064069
J031101064069J031101064069
J031101064069
theijes
 

Similar to IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor Networks (20)

Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
Energy Efficient Clustering Algorithm based on Expectation Maximization for H...
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
 
Routing Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient ApproachRouting Optimization with Load Balancing: an Energy Efficient Approach
Routing Optimization with Load Balancing: an Energy Efficient Approach
 
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
IRJET-Review on New Energy Efficient Cluster Based Protocol for Wireless Sens...
 
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
IRJET- An Enhanced Cluster (CH-LEACH) based Routing Scheme for Wireless Senso...
 
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
Delay Constraint Network Structure with in-Network Data Fusion for Wireless S...
 
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
Servant-ModLeach Energy Efficient Cluster Base Routing Protocol for Large Sca...
 
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor NetworksMobile Agents based Energy Efficient Routing for Wireless Sensor Networks
Mobile Agents based Energy Efficient Routing for Wireless Sensor Networks
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
B045070510
B045070510B045070510
B045070510
 
A review on energy efficient clustering routing
A review on energy efficient clustering routingA review on energy efficient clustering routing
A review on energy efficient clustering routing
 
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor NetworksEnergy Optimization in Heterogeneous Clustered Wireless Sensor Networks
Energy Optimization in Heterogeneous Clustered Wireless Sensor Networks
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 
Energy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A ReviewEnergy Proficient and Security Protocol for WSN: A Review
Energy Proficient and Security Protocol for WSN: A Review
 
J031101064069
J031101064069J031101064069
J031101064069
 
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...
 
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSNIRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
IRJET - Energy Efficient Enhanced K-Means Cluster-Based Routing Protocol for WSN
 
An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
meharikiros2
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 

IRJET- Chaos based Secured Communication in Energy Efficient Wireless Sensor Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 742 Chaos based Secured Communication in Energy Efficient Wireless Sensor Networks Nidarsh M P1, Mrs. G Padmaja Devi2 1 PG Scholar, Dept.of E&C, Malnad college of engineering, Karnataka, India 2 Associate Professor, Dept.of E&C, Malnad college of engineering, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Wireless sensor networks has a important role in recent network technology, WSN which contains number of sensor nodes used to monitor physical and environmental condition such as temperature, sound, vibration, pressure, humidity, motion or pollutants, further it sends their data through the network to main location. Some of the sensor nodes are furnished with supported battery power through which it can furnish ample of operation and it can also communicate with other nodes. Increasing the lifetime of the wireless sensor network, power management part is essential for improving the performance of WSN. This paper proposesa chaotic encryptionwithclusteredLowEnergyAdoptiveCluster Head (LEACH) algorithm for wireless energy efficient networks which also reduces the consumption in WSN. The performance of the proposed work is evaluated and comparison is done. Key Words: WSN, LEACH, Energy efficiency, network lifetime, chaotic encryption. 1. INTRODUCTION Wireless Sensor Network is a type of network which self- organizes with a huge number of small sensors. The main aim of sensor node is to complete the packet transmission among itself within the network area, whichcanidentifyand notice the physical entity of real world environment. WSN contain of various number of sensor nodeswhichcanfurther sense their locality and contact among themselves. Main characteristics of WSN nodes are contains tiny size, reasonable cost, lessconsumptionofpower,multi-functional such as it can perform sensing ,data processing, routing and communicate easily in short distances. Inabandonedhostile regions, these devices are implemented in general, but it becomes difficult to recharge the power source. With the help of multiple clusters,sensor nodesaredesigned and organized in a proper manner. The cluster head is selected by several group of nodes,hereeachand everynode can act has part of message transfer in between multiple nodes. At last, all nodes will go for sharing messages to base station by cluster head. Sensornetworksalwayspreferredto use cluster design, this in turn help us to capture for data gather and fusion operations by each of sensor nodes. It exchange message with cluster head which is going to send message to its nearest base station. The following figure 1 shows actual formation of cluster heads and selection of those are independent to each other. Fig -1: Cluster formation In current situation of WSN correct use of battery power is not up to the mark, due to which there will be dissimilarity while sending the message to destination node from source node. So multi hop communication plays a major role as a part of its requirements. Sometimes it’s preferred to use hierarchical routing during data transmission in order to improve sensor network lifetime. Cluster can be made by collecting group of nodes which helps to build hierarchical routing and cluster head to be selected by every clusterinits corresponding network. As a part of data transmission, cluster head liable for data collection from adjacent nodes and base station will go for receiving data. 2. RELATED WORK WSN facing its own challenges and issues can be identified by the researchers. To improve the network life time, many protocols have been followed. Here [1] introduced the protocol called Low Energy Adoptive Cluster Head [LEACH]. Hence it help us to get improved the energy performance of network. Drawback here is that the performance is notupto the mark D.Aradhana, NagaveniB.BiradarandK.LingaRaj[2] proposed the novel method to get more number of clusters from the network. Here, they were using mobileagentsfrom every cluster for sending data to cluster head instead of choosing nodes. These mobilenodeswill collectdata from all the nodes belong to network with that aggregation of data can be performed. The aggregated data will be received by the base station. The two components play a major role in this method, such as group array and ordinal array.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 743 Clustering has been broadly considered in the network literature as well as in information processing [3–5]. N Eghbali [6] deals with nodes are facing problems like lack of unique address in sensor network and it is most important for collecting information from the sensors. Once the nodes have got dispersed, accesses to corresponding nodes get delayed. The nodes present in the network will become useless and leads to decay behind the obtained energy gets over. Hence the issues related to energy consumption and optimization isa greaterchallengefacedin real time network applications.Recentlylotsmorehavebeen appreciated towards it. D. T. Ho, T. A. Johansen, J. B. D. Sousa, E. I. Grøtli and P. B. Sujit, [7], done a comparison with earlier papers, this paper have an enhanced method. First of all using a special scheme called PSO and its get modified with optimal path selection for relay data. This paper uses a mixture of two multiple access methods to achieve communication such as TDMA and CSMA/CA and performance comparison can be done in better way. Prof. Rajeev Vishwakarma, Apurva Bhalerao [8] discussed the concept of gaining reliability andenergyconsumption by doing setup of wireless sensor network in simulation. Based on some parameters of WSN, deciding the network stability in terms of energy and its existence. The particle swarm optimization is taken into consideration for optimizing the update time and hop distance. In order to improve the performance of WSN, the following parameters to be considered such as transmission power, used frequency, modulation technique and so on. NING WANG, WEI XIANG AND YUAN ZHOU, (Senior Member, IEEE) [9] illustrate the new method for to extend the lifetime of network using advanced particle swarm optimization algorithm. This is used to choose target nodes as a processofoptimization. The set of rules formed to get better results for parameters like transmission distance and energy efficiency. This paper proposes a distributed sensor in better way and balanced system for clusters to enhance the network lifetime. In early days, optimal cluster layout can be obtained by applying several fitness functions with the use of PSO [10-12]. Wireless sensor network is have some clustering problems, PSO act has a solution to those problems by embedding it into some other algorithms [13]. Alaa SHETA, Basma Fathi SOLAIMAN [14] addressed the WSN problem facing to use energy resources efficiently and minimizing traffic during transmission by applying balanced load distribution. To solve this type of problem, proposed a new way of finding optimal distribution of cluster heads and sensors. Hence, consumption of energy inversely proposed to lifetime of network. This paper comes with the idea of introducing hybrid cluster algorithm with the help of particle swarm optimization and K-means clustering. 3. METHODOLOGY Cluster head selection algorithm: Step-1: Create Sensor Network Model. Step-2: Assign initial energy to sensor nodes. Step-3: Sort the nodes based on the distance from Base station. Step-4: For round=1 assign cluster heads based on minimum distance from the base-station. Step-5: Continue step-4 for allotted number of round and corresponding cluster heads get selected. 3.1 LEACH PROTOCOL LEACH is network protocol and much essential to use. Since some nodes present in network is not at all useful when the battery dies. The LEACH protocol let us to find out the nodes lifespan and permitting to do minimal work it essentially used for data transmission Fig -2: Direct v/s Minimum transmission The energy used in direct transmission can be modeled by dk(3d1+d2)2 Whereas energy used for minimum transmissioncanalsobe modeled using dk(3d12+d22) Where d is energy dissipation k is length of message in bits Usually LEACH network is having two different stages such as set-up stage and steady stage. The set-up stage is meant for cluster heads selection and steady stage is used to maintain the cluster heads when the transmission of data is happening among nodes within the network. The Figure4 shows clear cut idea about using LEACH protocol by comparing with other cases. Here, second gives better arrangement since the network is accurately sectioned and neatly spaced out the cluster heads.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 744 Fig -3: LEACH v/s bad-case scenario 3.2 CHAOTIC CRYPTOGRAPHY 3.2.1 Two Dimensional Logistic Map The two dimensional logistic map is well known for its complicated chaotic behavior when compared to the one dimensional logistic map. It takes the input , and in a plane and maps it to a new point. Mathematically it can be defined as (1) (2) Where is the system parameter , are the pair wise points. The map depends on three values namely , and whose corresponding initial values are r =1.19 , and . 3.2.2 Three Dimensional Lorenz Map The Lorenz equation can be represented in differential equations having chaotic behavior for certain parameters with initial conditions. Mathematically it can be defined as (3) (4) (5) The System exhibits chaotic behavior when the parameters are having values , and Table -1: Network Security Initial Conditions Parameters 3.2.3 Encryption Scheme The proposed algorithm consists of two phases. The first phase includes Confusion which scramblesthedata and the second phase includes Diffusion which modifiesthedata based on the chaotic sequences.Theproposedcryptosystem is shown in Fig 1. Fig -4: Network Encryption Scheme Chaotic Maps Initial Conditions 2D Logistic Map = 0.1 = 0.1 3D Lorenz Map = 0.1 = 0.1 s=10 b=8/3 Input Node Informa tion Sequence Key 1 Conf usion Diffu sion Encry pted Data Key 2 Sequence Logistic Map Lorenz Map
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 745 3.2.4 Confusion For a byte level confusion is done by interchanging the positions of the information based on the chaotic sequence generated by 2D logistic map. The Nodal information X (row matrix) of size 1xN is takenas input for confusion. The chaotic sequence are generated by 2D logistic map and arrange them in a row matrix of size Mx1. Sort the obtained chaotic sequence in the ascendingorderandtheindexvalues are obtained in L1. The rows of matrix X are shuffled based on the index values of L1 to achieve matrix Y. 3.2.5 Diffusion Diffusion includes logical XOR operation between the confused data Y and the matrix containing the chaotic sequences obtainedfromthe three-dimensional Lorenzmap. Generate chaotic sequences from the three-dimensional Lorenz map. Convert the obtained sequences into integer value ranges from 0 to 255 and store them in a matrix Z1. Logical XOR is performed between confused data Y with the matrix obtained from Lorenz map Z1 to achievematrixH1 of size 1xN. The obtained encrypted matrix H1 is ready to transfer over the network. Fig -5: Block diagram of the proposed encryption technique 3.3 LIFE TIME OF THE CHAOS NETWORK The proposed research work is further extended to evaluate the life time of the network. It includes energy conservation in each and every sensor node by makes use of clustering and supporting cluster head selection energy optimization algorithm. The supporting cluster head is chosen based on residual energy. To increase the WSN lifetime, energy optimization techniques and energy conservation measures are enhanced. Parameters Initial Values Number of Nodes 100 Base station Location (100,100) Packet Length 2000 Initial Energy (E0) 2 Joules Tx Energy (ETX) 50 x 10-9 Joules Rx Energy (ERX) 50 x 10-9 Joules Data Aggregation Energy 5 x 10-9 Joules Table -2: Energy Efficient Network Parameters 4. RESULTS AND DISCUSSIONS Fig -6: Distribution of Nodes and Cluster Formation
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 746 Fig -7: Residual Energy versus Number of Iterations Fig -8: Number of Alive Nodes versus Number of Iterations Fig -9: Energy Variance versus Number of Iterations In order to evaluate the effect of network security on network life timevariousperformancemetricsaremeasured and compared with traditional LEACH technique. Residual Energy is evaluated in Figure 7 for both chaos based Clustered WSN and traditional LEACH algorithm and it is shown that Energy reduction is less when compared to LEACH. Figure 8 shows number of alive nodes when compared with the LEACH system. Figure 9 shows Average energy variance of all nodeshasless significant using proposed chaos based WSN. 5. CONCLUSIONS The performance of WSN is improved by LEACH based clustering and cluster head selection method algorithms by increasing the residual energy,throughput,quantityofactive nodes and packet delivery ratio. The better clustering algorithm builds clusters in a centralized manner within a base station and choice of cluster heads by using LEACH in dispersed manner. The performance metrics such as network lifetime, throughput, packet delivery ratio, delay, normalizedoverhead,total energyconsumptionandresidual energy are estimated and compared with advanced clustering methodology. The simulation result shows that the projected Chaotic Encryption with Clustered LEACH scheme gives improved performance in order to reduce the total energy consumption and increasing the lifetime of WSN. REFERENCES [1] Liu, Z., Liu, Z., and Wen, L. (2011). “A leach protocol for wireless sensor networks. In Advanced Computational Intelligence (IWACI)”,2011 Fourth International Workshop on, pages 766-769. [2] K. LingaRaj, D. Aradhana and Nagaveni B.Biradar, “Multiple mobile agents in wireless sensor networks using genetic algorithms”, International Journal of Scientific and EngineeringResearch,vol3,2012,pp1– 5. [3] Low CP, Fang C, Mee J, Ang, YH. Load-balanced clustering algorithms for wireless sensor networks. In: IEEE International Conference on Communications; 24–28 June 2007; Glasgow, UK. New York, NY, USA: IEEE. pp. 3485-3490. [4] Gavalas D, Mpitziopoulos A, Pantziou G, Konstantopoulos C. An approach for near-optimal distributed data fusion in wireless sensor networks. Wirel Netw 2010; 16: 1407-1425. [5] Tan R, Xing G, Li, B, Wang J, Jia X. Exploiting data fusion to improve the coverage of wireless sensor networks. IEEE/ACM Tr Netw 2012; 20: 450-462. [6] N.Eghbali,”PerformanceImprovementofInformation Dissemination Protocols in Sensor Networks
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 747 Through Data Aggregation, Computer Engineering andInformationTechnologyDepartment”,2007.PP1- 121. [7] D. T. Ho, E. I. Grøtli, P. B. Sujit, T. A. Johansen, and J. B. D. Sousa, “Cluster-based communication topology selection and UAV path planning in wireless sensor networks,” in Proc. of International Conference on Unmanned Aircraft Systems (ICUAS). Atlanta, GA, USA: IEEE, 2013. [8] Prof. Rajeev Vishwakarma, Apurva Bhalerao, “Performance of Wireless Sensor Network using Particle Swarm Optimization Algorithm”, International Journal of Computer Application (2250-1797) Volume 6– No.1, January- February 2016. [9] YUAN ZHOU, (Senior Member, IEEE), NING WANG, AND WEI XIANG, (Senior Member, IEEE),“Clustering Hierarchy Protocol in Wireless Sensor Networks Using an Improved PSO Algorithm”, date of publication December 1, 2016, date of current version March 13, 2017. [10] Latiff N, Tsimenidis C, Sharif B. Energy-aware clustering for wireless sensor networks using particle swarm optimization. In: IEEE 18th International Symposium on Personal, Indoor and Mobile RadioCommunications;3–7September2007; Athens, Greece. New York, NY, USA: IEEE. pp. 1-5. [11] Hou J, Fan X, Wang W, Jie J, Wang Y. Clustering strategy of wireless sensor networks based on improved discrete particle swarm optimization. In: IEEE Sixth International Conference on Natural Computation; 10–12 August 2010; Yantai, China. New York, NY, USA: IEEE. pp. 3866-3870. [12] Kulkarni R, Venayagamoorthy G. Particle swarm optimization in wireless sensor networks: a brief survey. IEEE TSyst Man Cy C 2011; 41: 262-267. [13] KarthikeyanM,VenkatalakshmiK.Energy conscious clustering of wireless sensor network using PSO incorporated cuckoo search. In: IEEE Third International Conference on Computing Communication Networking Technologies; 26–28 July 2012; Coimbatore, India. New York, NY, USA: IEEE. pp. 1-7. [14] Basma Fathi SOLAIMAN,, Alaa SHETA, “Energy optimization in wireless sensor networks using a hybrid K-means PSO clustering algorithm”, Turk Journal of Electrical Engineering & Computer Science(2016) 24: 2679 – 2695,doi:10.3906/elk- 1403-293.