Header menu link for other important links
X
Performance analysis of secure leach based clustering protocol in wireless sensor networks
, K.S. Preetha
Published in Research India Publications
2015
Volume: 10
   
Issue: 14
Pages: 34035 - 34041
Abstract
In wireless sensor networks clustering is one of the techniques used for energy efficiency. LEACH (Low-energy adaptive clustering hierarchy) is a widely used clustering based routing protocol used for energy efficiency by rotating cluster heads in rounds. But in this protocol, wireless sensor networks are vulnerable to security attacks. To establish security, Secure-LEACH protocol uses shared keys between base station and sensor nodes. These keys are used to generate message authentication code, through which the base station verifies authenticity of the nodes. Secure-LEACH prevents intruders from participating in the network as cluster heads. It also enables the base station to discard any detected bogus messages. Secure-LEACH protects the network from outsider attackers. © Research India Publications.
About the journal
JournalInternational Journal of Applied Engineering Research
PublisherResearch India Publications
ISSN09734562