A Study on Security Advances for LEACH in WSN
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2016, Vol 5, Issue 3
Abstract
Wireless Sensor Network consist of several autonomous sensor nodes that are capable of some sort of sensing power. Since the sensor nodes are placed in harsh environments, WSN is vulnerable to various types of attacks. Hence security is very important for various WSN applications. Most of the energy efficient routing protocols for WSN are hierarchical or cluster-based routing protocol. The important concern of routing protocols of WSNs is to balance the energy consumption as well as maintaining the security level. Many secure cluster-based routing protocols have been proposed to achieve the above concern. In this paper, we study various security advances for LEACH in WSN and they are analyzed based on its energy efficiency and security level.
Authors and Affiliations
Ashitha C, Vini E. V
Minimising Attacks Using ATPG On Networks
Today's networks require much human involvement to keep them working. Everyday network engineers struggle with router mis-configurations, fibercuts, faulty interfaces, mislabelled cables, software bugs, intermittent...
Security and Privacy in the Context of the Public Clouds
The present perspective on the confidential data hosted in the cloud is based on fine-grained encryption of the data. Under such approaches, data owners are in charge of encrypting the data before uploading them on t...
An Overview on Template Matching Methodologies and its Applications
A very common task in pattern recognition is template matching. The detection and recognition of objects in images is a key research topic in the computer vision community. Within this area, image recognition and in...
Hardware Implementation of RFID Collaberal Affirmation Protocol
Radio-frequency identification (RFID) is a free space technology which implements radio communication to identify objects with a specific electrical property. The great in extent deployment of RFID technologies may cr...
Performance Based Symmetric Load Balancing Algorithm
Mainly Distributed Hash Table uses decentralized load balance algorithms which are based on virtual servers for participating in asymmetric peers. Require the participating peers to be asymmetric, thereby introducing...