Lightweight Security Protocol for Efficient Information Transfer in Sensor Networks
Andhe Dharani1, Manjuprasad B2

1Dr. Andhe Dharani, Department of MCA, R.V. College of Engineering, Bengaluru, India.
2Dr. Manjuprasad B, Department of Computer Science and Engineering, GSSS Institute of Engineering and Technology for Women, Mysuru, India.

Manuscript received on 21 August 2019. | Revised Manuscript received on 25 August 2019. | Manuscript published on 30 September 2019. | PP: 6541-6546 | Volume-8 Issue-3 September 2019 | Retrieval Number: C5259098319/2019©BEIESP | DOI: 10.35940/ijrte.C5259.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Wireless Sensor Networks have become major integral components of various other technologies like- IoT, Big Data, Cloud Computing and many. This impact is also making WSNs to grow more rapidly and its global market size is predicted to grow $944.92 million by 2020, at a CAGR of 12.96%. In-spite of this impact some challenges and application requirements in WSNs is there limiting its performance. In this article a detailed analysis and research has been carried out to address and resolve some of the major issues in the WSNs. This paper mainly aims in identifying and analyzing the major challenges and requirements along with some existing works in WSNs. Based on the identified problems this article presents the solution to increase the performance of WSNs. The main focus is given to energy and security aspects in the WSNs. The proposed protocol provides more strengthening security parameters with a focus on increasing the lifetime of the network in the resource constraint devices. The outcome of this paper is resulted in better results than the existing security and energy mechanism in the field of the wireless sensor networks.
Keywords: Wireless Sensor Networks, Sensors, Energy, Security, Clustering, LEACH, DBCH, SecLEACH, SLEACH

Scope of the Article:
Network Protocols & Wireless Networks