Table 8 Analysis of the execution time of the proposed algorithm and comparison with the reference 49.

From: Enhancing the LEACH protocol and lightweight chaotic cryptography for secure data transmission in wireless sensor networks

Image

Size

Total ENC/DEC (s)

This work

49

Lena

256 × 256

4.73/4.65

5.0388

Baboon

256 × 256

4.12/4.32

4.6078

Panda

256 × 256

4.26/4.45

4.7363

Pipper

256 × 256

4.83/4.91

6.0214