Reference Hub3
Energy Consumption Analysis of Secure and Clustered Wireless Sensor Network

Energy Consumption Analysis of Secure and Clustered Wireless Sensor Network

Ashim Pokharel, Ethiopia Nigussie
Copyright: © 2014 |Volume: 5 |Issue: 1 |Pages: 22
ISSN: 1947-3176|EISSN: 1947-3184|EISBN13: 9781466654198|DOI: 10.4018/ijertcs.2014010102
Cite Article Cite Article

MLA

Pokharel, Ashim, and Ethiopia Nigussie. "Energy Consumption Analysis of Secure and Clustered Wireless Sensor Network." IJERTCS vol.5, no.1 2014: pp.15-36. http://doi.org/10.4018/ijertcs.2014010102

APA

Pokharel, A. & Nigussie, E. (2014). Energy Consumption Analysis of Secure and Clustered Wireless Sensor Network. International Journal of Embedded and Real-Time Communication Systems (IJERTCS), 5(1), 15-36. http://doi.org/10.4018/ijertcs.2014010102

Chicago

Pokharel, Ashim, and Ethiopia Nigussie. "Energy Consumption Analysis of Secure and Clustered Wireless Sensor Network," International Journal of Embedded and Real-Time Communication Systems (IJERTCS) 5, no.1: 15-36. http://doi.org/10.4018/ijertcs.2014010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Due to limited energy resources, different design strategies have been proposed in order to achieve better energy efficiency in wireless sensor networks, and organizing sensor nodes into clusters and data aggregation are among such solutions. In this work, secure communication protocol is added to clustered wireless sensor network. Security is a very important requirement that keeps the overall system usable and reliable by protecting the information in the network from attackers. The proposed and implemented AES block cipher provides confidentiality to the communication between nodes and base station. The energy efficiency of LEACH clustered network and with added security is analyzed in detail. In LEACH clustering along with the implemented data aggregation technique 48% energy has been saved compared to not clustered and no aggregation network. The energy consumption overhead of the AES-based security is 9.14%. The implementation is done in Contiki and the simulation is carried out in Cooja emulator using sky motes.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.