{"title":"Comparison of LEACH protocol withWormhole Attack and without WormholeAttack in Wireless Sensor Networks","authors":"P.Mahalakshmi","doi":"10.15662/IJAREEIE.2015.0404028","DOIUrl":null,"url":null,"abstract":"In Wireless Sensor Networks, routing is the major concern. It comprises of small sensor nodes with limited resources. It is necessary to introduce a routing protocol to extend network life time and to reduce the power consumption in sensor nodes. LEACH is one of the most interested techniques that offer an efficient way to minimize the power consumption in sensor networks. It uses self organizing and dynamic cluster formation which makes it attractive to various routing attacks, such as Denial of Service (DoS), Black hole, Wormhole and Sybil attacks. Wormhole attack is a Denial of Service attack launched by malicious nodes. It records packets at one location and tunnels them into another location. To check the reliable operation of LEACH, implement wormhole attack and evaluated the LEACH protocol in terms of metrics like throughput, average end-to-end delay, Packet Delivery Ratio (PDR). The evaluation of LEACH with wormhole attack has been done with the help of NS2 simulator. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. It can be implemented in LEACH. In Watchdog-LEACH, some nodes are considered as watchdogs and some changes are applied on LEACH protocol for intrusion detection. Watchdog-LEACH is able to protect against a wide range of attacks and it provides security, energy efficiency and memory efficiency. Comparison made on LEACH with wormhole attack and LEACH with watchdog shows that LEACH with watchdog achieves high throughput, Packet Delivery Ratio and low End to End Delay.","PeriodicalId":13702,"journal":{"name":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","volume":"22 1","pages":"2053-2059"},"PeriodicalIF":0.0000,"publicationDate":"2015-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15662/IJAREEIE.2015.0404028","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
In Wireless Sensor Networks, routing is the major concern. It comprises of small sensor nodes with limited resources. It is necessary to introduce a routing protocol to extend network life time and to reduce the power consumption in sensor nodes. LEACH is one of the most interested techniques that offer an efficient way to minimize the power consumption in sensor networks. It uses self organizing and dynamic cluster formation which makes it attractive to various routing attacks, such as Denial of Service (DoS), Black hole, Wormhole and Sybil attacks. Wormhole attack is a Denial of Service attack launched by malicious nodes. It records packets at one location and tunnels them into another location. To check the reliable operation of LEACH, implement wormhole attack and evaluated the LEACH protocol in terms of metrics like throughput, average end-to-end delay, Packet Delivery Ratio (PDR). The evaluation of LEACH with wormhole attack has been done with the help of NS2 simulator. Watchdog is a monitoring technique which detects the misbehaving nodes in the network. It can be implemented in LEACH. In Watchdog-LEACH, some nodes are considered as watchdogs and some changes are applied on LEACH protocol for intrusion detection. Watchdog-LEACH is able to protect against a wide range of attacks and it provides security, energy efficiency and memory efficiency. Comparison made on LEACH with wormhole attack and LEACH with watchdog shows that LEACH with watchdog achieves high throughput, Packet Delivery Ratio and low End to End Delay.