Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Heterogeneous Leach Protocol with Sink Node Protection in a Wireless Sensor Network


Affiliations
1 Department of Information Technology and Engineering, Walchand College of Engineering, India
     

   Subscribe/Renew Journal


Wireless Sensor Network (WSN) is the group of sensing computing and communication components that gives ability to sense a physical phenomenon in a specified environment. The main problem of WSN is energy consumption or battery power, to avoid such problems different type of routing protocols is used. LEACH routing protocol is used to reduce the energy consumption and enhance the battery power and network lifetime. Homogeneous LEACH has some limitation and there is no security provides to sink node. To overcome this limitation of Homo LEACH protocol heterogeneous LEACH protocol with sink node security is used in this paper. In a heterogeneous LEACH two or more different types of nodes with different battery power and functionality are used. Sink node is a sensor node which has large energy capacity and it collects data from other node. Sometime sink node affected by different type of attack such as sinkhole, black hole attack etc. to avoid these types of attack various technique are used such as intrusion detection, watchdog scenario etc.

Keywords

LEACH Protocol, Clustering, Heterogeneous WSN, Energy Consumption, Network Lifetime, Cluster Head, Base Station.
Subscription Login to verify subscription
User
Notifications
Font Size

  • M. Elshrkawey, S. Elsherif and M. Wahed, “An Enhancement Approach for Reducing the Energy Consumption in Wireless Sensor Network”, Journal of King Saud University-Computer and Information Sciences, Vol. 30, No. 2, pp. 259-267, 2018.
  • M.J. Handy, M. Hasse and D. Timmermann, “Low Energy Adaptive Clustering Hierarchy with Deterministic Cluster Head Selection”, Proceedings of International Workshop on Mobile and Wireless Communication Network, pp. 31-36, 2002.
  • S.E.L. Khediri, N. Nasri, Anne Wei and A. Kachoury, “A New Approach for Clustering in Wireless Sensor Networks based on LEACH”, Procedia Computer Science, Vol. 32, pp. 1180-1185, 2014.
  • Brajesh Mishra, Sarvesh Singh Rai and Navdeep Kaur Saluja, “M-LEACH: A Modified Version of LEACH for WSN”, Journal of Emerging Technologies and Innovation Research, Vol. 2, No. 12, pp. 82-87, 2015.
  • P.K. Batra and K. Kant, “LEACH-MAC: A New Cluster head Wireless Sensor Network”, Wireless Networks, Vol. 22, No. 1, pp. 49-60, 2016.
  • Sunkara Vinodh Kumar and Ajit Pal, “Assisted-Leach (ALeach) Energy Efficient Routing Protocol for Wireless Sensor Networks”, International Journal of Computer and Communication Engineering, Vol. 2, No. 4, pp. 420-424, 2013.
  • S.K. Singh, P. Kumar and J.P. Singh, “A Survey on Successors of LEACH Protocol”, IEEE Access, Vol. 5, pp. 4298-4328, 2017.
  • Zhenfu Ma, Guangming Li and Qingchao Gong “Improvement on LEACH-C Protocol of Wireless Sensor Network (LEACH-CC)”, International Journal of Future Generation Communication and Networking, Vol. 9, No. 2, pp. 183-192, 2016.
  • Shaveta Gupta and Vinay Bhatia, “GMMC: Gaussian Mixture Model Based Clustering Hierarchy Protocol in Wireless Sensor Network”, International Journal of Scientific Engineering and Research, Vol. 3, No. 7, pp. 44-49, 2015.
  • Ioannis Krontiris, Thanassis Giannetsos and Tassos Dimitriou, “Launching a Sinkhole Attack in Wireless Sensor Networks the Intruder Side”, Proceedings of IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 12-15, 2017.
  • L. Yadav and C.H. Sunitha, “Low Energy Adaptive Clustering Hierarchy in Wireless Sensor Network (LEACH)”, Proceedings of IEEE International Conference on Inventive Systems and Control, pp. 17-21, 2014.
  • Ranjeeth Kumar Sundararajan and Umamakeswari Arumugam, “Intrusion Detection Algorithm for Mitigating Sinkhole Attack on LEACH Protocol in Wireless Sensor Networks”, Journal of Sensors, Vol. 2015, pp. 1-12, 2015.
  • Monika, Sneha Chauhan and Nishi Yadav, “LEACH-I Algorithm for WSN”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, No. 3, pp. 3459-3466, 2016.
  • Pushpender Kumar Dhiman and Shilpa Mahajan, “Clustering in Wireless Sensor Networks: A Review”, International Journal of Advanced Research in Computer Science, Vol. 7, No. 3, pp. 198-201, 2016.
  • Shipra Singla and Karamjot Kaur, “Comparative Analysis of Homogeneous N Heterogeneous Protocols in WSN”, International Journal of Science and Research, Vol. 5, No. 6, pp. 1300-1305, 2016.
  • Dinesh Singh, Parvinder Singh and Vikram Singh, “A 3-Tier Heterogeneous Secure Routing protocol for Wireless Sensor Network”, International Journal of Information Technology and Knowledge Management, Vol. 5, No. 2, pp. 477-483, 2012.
  • R.K. Gill, P. Chawla and M. Sachdeva, “Study of LEACH Routing Protocol for Wireless Sensor Networks”, International Journal of Computer Science and Information Technologies, Vol. 7, No. 4, pp. 1894-1896, 2014.
  • Jitender Grover and Shikha Sharma, “Security Issues in Wireless Sensor Network-A Review”, Proceedings of International Conference on Reliability, Infocom Technologies and Optimization, pp. 1-6, 2016.
  • George W. Kibirige and Camilius Sanga, “A Survey on Detection of Sinkhole Attack in Wireless Sensor Network”, International Journal of Computer Science and Information Security, Vol. 13, No. 5, pp. 1-9, 2015.
  • K. Johny Elma and S. Meenakshi, “Energy Efficient Clustering for Lifetime Maximization and Routing in WSN”, International Journal of Applied Engineering Research, Vol. 13, No. 1, pp. 337-343, 2018.

Abstract Views: 334

PDF Views: 0




  • Heterogeneous Leach Protocol with Sink Node Protection in a Wireless Sensor Network

Abstract Views: 334  |  PDF Views: 0

Authors

Bhagyshree Pawde
Department of Information Technology and Engineering, Walchand College of Engineering, India
Bharathi Shetty
Department of Information Technology and Engineering, Walchand College of Engineering, India

Abstract


Wireless Sensor Network (WSN) is the group of sensing computing and communication components that gives ability to sense a physical phenomenon in a specified environment. The main problem of WSN is energy consumption or battery power, to avoid such problems different type of routing protocols is used. LEACH routing protocol is used to reduce the energy consumption and enhance the battery power and network lifetime. Homogeneous LEACH has some limitation and there is no security provides to sink node. To overcome this limitation of Homo LEACH protocol heterogeneous LEACH protocol with sink node security is used in this paper. In a heterogeneous LEACH two or more different types of nodes with different battery power and functionality are used. Sink node is a sensor node which has large energy capacity and it collects data from other node. Sometime sink node affected by different type of attack such as sinkhole, black hole attack etc. to avoid these types of attack various technique are used such as intrusion detection, watchdog scenario etc.

Keywords


LEACH Protocol, Clustering, Heterogeneous WSN, Energy Consumption, Network Lifetime, Cluster Head, Base Station.

References