Improved version of secure watermarking LEACH: R-watermarking LEACH

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As wireless sensor networks (WSN) deployment are broadly spreading in various fields. Therefore security becomes a vital issue. Most of the researcher's attention is only on utility of sensor network and possibility of sensor network rather than security. In our work we do focus on security for that we consider privacy and integrity the main issues of sensor networks related to security. In WSNs, various schemes have previously introduced by various researchers to manage security, but few algorithm have been considered the privacy and integrity at both sensor nodes cluster member and CH nodes. In our work we have present a secure algorithm to control integrity and privacy at both node level and cluster head level in WSN. In our protocol we have control the integrity by watermarking technique and privacy is managed using encryption technique.

Cite

CITATION STYLE

APA

Rani, R., & Singh, H. (2019). Improved version of secure watermarking LEACH: R-watermarking LEACH. International Journal of Engineering and Advanced Technology, 8(6), 4030–4034. https://doi.org/10.35940/ijeat.F9304.088619

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free