Secure Energy Efficient LEACH (EE_LEACH) Protocol for Wireless Sensor Networks

A. Hima Bindu*, V. V. Rama Prasad**
* PG Scholar, Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College, Tirupati, India.
** Professor, Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College, Tirupati, India.
Periodicity:July - September'2016
DOI : https://doi.org/10.26634/jwcn.5.2.8169

Abstract

Wireless Sensor Network (WSN) is an infrastructureless network with large number of sensing nodes that can monitor areas such as physical or environmental conditions (i.e., temperature, sound, pressure) to collect and report data to the Base Station (BS). Networks face several challenges like energy, and power. Since the sensor nodes are not battery replaceable, the limited energy resource is a main challenge in facing security for WSNs. Hence, network lifetime becomes a major criteria and can be improved by energy efficient routing and secure energy efficient routing for WSN. Routing protocols that provides an effective design in data gathering are energy efficient cluster-based routing protocols. The existing approach (EE-LEACH) provides a WSN with less energy consumption. However, it concentrates mainly in energy resource, but lacks in providing security resources to the network. This paper presents a proposed Energy Efficient LEACH protocol using lightweight secure LEACH (LS_LEACH), where a broadcast authentication algorithm is integrated to produce authenticity. Moreover, the experimental results show the development of proposed EE_LEACH protocol and existing protocol in terms of system throughput, energy consumption and network lifetime. It is obviously shown that the proposed method will provide better network performance and improves the network lifetime.

Keywords

Wireless Sensor Network, Cluster Head, Base Station, Low Energy Adaptive Clustering Hierarchy (LEACH), Energy Efficient Routing, Security Measures.

How to Cite this Article?

Bindu, A.H., and Prasad, V.V.R. (2016). Secure Energy Efficient LEACH (EE_LEACH) Protocol for Wireless Sensor Networks. i-manager's Journal on Wireless Communication Networks, 5(2), 1-9. https://doi.org/10.26634/jwcn.5.2.8169

References

[1]. Y Yao, Q Cao & AV Vasilakos, (2013). “EDAL: An Energy- Efficient, Delay-Aware, and Lifetime-Balancing Data th Collection Protocol for Wireless Sensor Networks”. IEEE 10 International Conference on Mobile Ad-Hoc and Sensor Systems (MASS), pp.182-190.
[2]. L Xiang, J Luo, & A Vasilakos, (2011). “Compressed data aggregation for energy efficient wireless sensor networks”. IEEE International Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp.46-54.
[3]. N. Chilamkurti, S. Zeadally & A Vasilakos, (2009). “Cross-layer support for energy efficient routing in wireless sensor networks”. Journal on Sensor Networks, pp.1-9.
[4]. X-Y Liu, Y Zhu, L Kong, C Liu, & Y Gu, AV Vasilakos, et al., (2014). “CDC: Compressive Data Collection For Wireless Sensor Networks”. IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.8, pp.2188-2197.
[5]. Y-h Zhu, W. W-d, J. Pan & T. Y-p, (2010). “An energyefficient data gathering algorithm to prolong lifetime of wireless sensor networks”. Journal on Computational Communication, Vol.33, pp.639-647.
[6]. X. Min, S. Wei-Ren, J. Chang-Jiang, & Z. Ying, (2010). “Energy efficient clustering algorithm for maximizing lifetime of wireless sensor networks”. International journal on Electronic Communications, Vol.64, pp.289-298.
[7]. D. Karaboga, S. Okdem & C. Ozturk, (2012). “Cluster based wireless sensor network routing using artificial bee colony algorithm”. Journal on Wireless Networks, Vol.18, pp.847-860.
[8]. J. Yuea, W. Zhang, W. Xiao, & D. Tang, (2012). “Energy efficient and balanced cluster-based data aggregation algorithm for wireless sensor networks”. Proceedings of Engineering, Vol.29, pp.2009-2015.
[9]. M. Guechari, L. Mokdad & S. Tan, (2012). “Dynamic solution for detecting denial of service attacks in wireless sensor networks”. IEEE ICC Ad-hoc and Sensor Networking Symposium, Ottawa, ON, Canada, pp.173-177.
[10]. Bai Li & L. Batten, (2007). “Using Mobile Agents to Detect Node Compromise in Path-Based DoS Attacks on Wireless Sensor Networks”. Wireless Communications, Networking and Mobile Computing, International Conference, Shanghai, China, pp.2507-2510.
[11]. L. Gheorghe, R. Rughinis, R. Deaconescu,& N. Tapus, (2010). “Authentication and Anti-replay Security Protocol for Wireless Sensor Networks”. 2010 Fifth International Conference on Systems and Networks Communications (ICSNC), pp.7-13.
[12]. Mohamed Ben Haj Frej, & Khaled M. Elleithy, (2015). “Secure Data Aggregation Model (SDAM) in Wireless Sensor Networks”. International Conference Paper on Network Security.
[13]. L. B. Oliveira, H. C. Wong, M. Bern, R. Dahab, &A. A. Loureiro, (2006). “SecLEACH-A random key distribution solution for securing clustered sensor networks”. Fifth IEEE International Symposium on Network Computing and Applications, NCA 2006, pp.145-154.
[14]. W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, (2000). “Energy efficient communication protocol for wireless and microsensor networks”. International Conference on System Sciences, Maui, Hawaii, pp.1-10.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.