Studying the Effect of Changing the Security Techniques Used in the MS-LEACH Protocol on the Energy Consumed in WSN Networks
Keywords:
security, WSN, Hierarchical Routing Protocols, Symmetric cryptography, Energy-cost, Secure routing, Block cipher, AES, RC5, Skipjack, Message authentication code, CBC-MAC, HMAC, MatLabAbstract
Wireless sensor networks are pioneers in the field of technology, and it's being focused on employing them in different fields, it will also be the foundation stone of Internet Of Things (IOT). And data collected in some WSN applications may need to be confidential and arrive at its destination properly, and this is a major challenge in WSN due to its limited resources such as energy and computational capabilities, which makes finding appropriate protection mechanisms a difficult task. Symmetric cryptographic algorithms such as RC5, AES, and Skipjack are more suited for secrecy than asymmetric cryptographic algorithms, as they are faster to implement and less complicated in calculations. And CBC-MAC and HMAC technologies are also among the most important message integrity and sending node identity verification technologies.
In this research, we first evaluated the performance of the two secure hierarchical protocols SecLEACH and MS-LEACH in the steady-state phase, We implemented scenarios using MatLab, and we used two main metrics to evaluate performance: residual power and the number of alive nodes in the network. The results showed that the SecLEACH protocol is less energy consuming than the MS-LEACH protocol, but this protocol does not guarantee the confidentiality of the transmitted data, while the MS-LEACH protocol ensures that which results in consuming more energy compared to SecLEACH.
We then studied the effect of applying a range of security technologies such as RC5, Skipjack and HMAC in the MS-LEACH protocol in order to improve the energy efficiency of the network, and the results showed that the use of the Skipjack encryption algorithm and the HMAC authentication algorithm in the MS-LEACH protocol prolonged the network life and improved energy efficiency.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 ttps://creativecommons.org/licenses/by-nc-sa/4.0/
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The authors retain the copyright and grant the right to publish in the magazine for the first time with the transfer of the commercial right to Tishreen University Journal for Research and Scientific Studies - Engineering Sciences Series
Under a CC BY- NC-SA 04 license that allows others to share the work with of the work's authorship and initial publication in this journal. Authors can use a copy of their articles in their scientific activity, and on their scientific websites, provided that the place of publication is indicted in Tishreen University Journal for Research and Scientific Studies - Engineering Sciences Series . The Readers have the right to send, print and subscribe to the initial version of the article, and the title of Tishreen University Journal for Research and Scientific Studies - Engineering Sciences Series Publisher
journal uses a CC BY-NC-SA license which mean
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material
- The licensor cannot revoke these freedoms as long as you follow the license terms.
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- NonCommercial — You may not use the material for commercial purposes.
- ShareAlike — If you remix, transform, or build upon the material, you must distribute your contributions under the same license as the original.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.