Analysis of LEACH Routing Protocol in Wireless Sensor Network with Wormhole Attack

K P Sampoornam,S. Saranya, G K Mohanapriya, P Sandhiya Devi, S Dhaarani

2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV)(2021)

引用 6|浏览3
暂无评分
摘要
Unique features such as limited battery power, dynamic topology, and restricted bandwidth make the Wireless Sensor Network (WSN) susceptible to a lot of types of attacks. The interest in WSN security research has grown over the last few years. WSN's self-and-less-governing design of infrastructure is a demanding security problem. One of the serious attacks on the wireless sensor network is the wormhole attack. A malicious node denial of service (DoS) attack is a wormhole attack by constructing a tunnel by which packets are replayed for malicious nodes that block the channel of communication and corrupt the routing of the network. This paper explains LEACH protocol simulation and thus network optimization by regulating the number of Cluster Heads (CHs) that minimize the dissipation of energy and extend the network’s lifetime. The assessment of the LEACH with the wormhole attack was performed in this paper.
更多
查看译文
关键词
Wireless Sensor Networks (WSN),Wormhole attack,LEACH protocol,Cluster Heads (CHs)
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要