Loading

Improved Version of Secure Watermarking LEACH: R-Watermarking LEACH
Rekha Rani1, Harmaninderjit Singh2
1Rekha Rani, Research Scholar Department of Computer Science, Desh Bhagat University, Mandi Gobindgarh, (Punjab), India.
2Harmaninderjit Singh, Assistant professor in Computer Science, Desh Bhagat University, Mandi Gobindgarh (Punjab), India.
Manuscript received on July 20, 2019. | Revised Manuscript received on August 10, 2019. | Manuscript published on August 30, 2019. | PP: 4030-4034 | Volume-8 Issue-6, August 2019. | Retrieval Number: F9304088619/2019©BEIESP | DOI: 10.35940/ijeat.F9304.088619
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: As wireless sensor networks (WSN) deployment are broadly spreading in various fields. Therefore security becomes a vital issue. Most of the researcher’s attention is only on utility of sensor network and possibility of sensor network rather than security. In our work we do focus on security for that we consider privacy and integrity the main issues of sensor networks related to security. In WSNs, various schemes have previously introduced by various researchers to manage security, but few algorithm have been considered the privacy and integrity at both sensor nodes cluster member and CH nodes. In our work we have present a secure algorithm to control integrity and privacy at both node level and cluster head level in WSN. In our protocol we have control the integrity by watermarking technique and privacy is managed using encryption technique.
Keywords: Integrity, Privacy, Cryptography, Watermarking