A Study on Security Advances for LEACH in WSN

Abstract

Wireless Sensor Network consist of several autonomous sensor nodes that are capable of some sort of sensing power. Since the sensor nodes are placed in harsh environments, WSN is vulnerable to various types of attacks. Hence security is very important for various WSN applications. Most of the energy efficient routing protocols for WSN are hierarchical or cluster-based routing protocol. The important concern of routing protocols of WSNs is to balance the energy consumption as well as maintaining the security level. Many secure cluster-based routing protocols have been proposed to achieve the above concern. In this paper, we study various security advances for LEACH in WSN and they are analyzed based on its energy efficiency and security level.

Authors and Affiliations

Ashitha C, Vini E. V

Keywords

Related Articles

Design and Implementation of GSM based Irrigation System Using ARM7

The developed system is a machine based system, which automates the irrigation of land by combining various software and hardware approaches together to find exact field information and to provide instant across the...

AUTOMATIC SLIDE NAVIGATOR BY VOICE COMMANDS USING MICROCONTROLLER

The main objective of this paper is to control the power point presentation slides through user voice commands around the distance of 300 meters with out any physical connection between control system and Personal c...

Implementation of Symmetric Stream Cipher for Text Encryption Using Key Sequence of Cyclic Elliptical Curve Points Based on PRNG

In this paper, cyclic elliptic curves of the form y2 = x 3 + ax + b mod p € E(Fp) with order N is considered in the design of a symmetric key text Encryption Scheme with Key Sequence derived from random sequence of...

Power Management Strategy In Hybrid PV-FC And Wind- Power Generation Systems By Using Multi Input Single-Control (MISC) Battery

Global energy consumption is dramatically increasing due to higher standard of living and the increasing world population. The world has limited fossil and oil resources. As a consequence, the need for renewable ener...

Performance Evaluation of different Routing Algorithm in Wireless Ad hoc Networks

A mobile ad hoc network consists of wireless hosts and the movement of hosts results in a change in routes. There are many routing protocols proposed by different researchers but to determine which one work efficient...

Download PDF file
  • EP ID EP28398
  • DOI -
  • Views 273
  • Downloads 5

How To Cite

Ashitha C, Vini E. V (2016). A Study on Security Advances for LEACH in WSN. International Journal of Research in Computer and Communication Technology, 5(3), -. https://europub.co.uk/articles/-A-28398