Detection of Malicious Cluster Head causing Hello Flood Attack in LEACH Protocol in Wireless Sensor Networks

Download Now
Provided by: International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Topic: Security
Format: PDF
Wireless sensor networks have wide range applications using different routing protocols to route the data towards the sink. However, these protocols being too simple are prone to various attacks. LEACH is a highly secure protocol with dynamic selection of cluster heads based on received signal strength. But as with other protocols, LEACH is prone to hello flood attack when the adversary becomes the cluster head and sensors being computation and energy constrained cryptographic approaches to prevent this attack are not too helpful.
Download Now

Find By Topic