An Approach To Secure Leach Using TESLA Based Certificate

Provided by: zhengzhihang
Topic: Security
Format: PDF
Wireless Sensor Network (WSN) has a group of sensors, which communicate by hop-by-hop communication for applications like surveillances, military and tracking. The WSN has low computational power and energy. So, the algorithms designed for WSN should be such that, they extend the lifetime, use less computations with maximum coverage. Low Energy Adaptive Clustering Hierarchy protocol (LEACH) is secured in this approach. Since WSN is deployed in hostile environment, LEACH is prone to active attacks. Many attempts exist to improve the security of LEACH.

Find By Topic