UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 10 | October 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 10 Issue 8
August-2023
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2308251


Registration ID:
523179

Page Number

c444-c453

Share This Article


Jetir RMS

Title

Leach Protocol Performance Evolution with Reference of Sinkhole Attack

Abstract

Researchers' interest in Wireless Sensor Networks (WSNs) has increased because of the wide range of possible applications. A WSN essentially consists of a collection of sensor nodes that are powered by a tiny battery integrated into each node. A crucial component of wireless sensor networks is security. LEACH is the most well-known cluster-based routing protocol, and it is utilized in WSNs. The sinkhole attack is the most harmful routing attack that may be used against this protocol. LEACH employs a centralized clustering method and has the same steady-state phase as LEACH. Most wireless sensor networks employ a many-to-one communication strategy for data collecting. Sensor network attacks that are effective include jamming, DOS attacks, sinkhole attacks, and black-hole attacks. One of the most destructive routing attacks is the sinkhole attack. The challenge with the sinkhole attack is that a sphere of influence is created when a subverted node or malicious node broadcasts the desirable routing information and compels networks to route data towards it. Therefore, a sinkhole attack results in decreased network performance. In this study, we'll assess the LEACH Protocol's effectiveness in sinkholeand non-sinkhole-attacked networks. To carry out the planned work, we will use MATLAB, and we'll build a performance graph to assess how the LEACH protocol performed.

Key Words

Sinkhole Attack, Wireless Sensor Network (WSN), low energy adaptive clustering hierarchy (LEACH), Cluster Head (CH), Secure Low Energy Adaptive Clustering Hierarchy (SLEACH)

Cite This Article

"Leach Protocol Performance Evolution with Reference of Sinkhole Attack", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.10, Issue 8, page no.c444-c453, August-2023, Available :http://www.jetir.org/papers/JETIR2308251.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Leach Protocol Performance Evolution with Reference of Sinkhole Attack", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.10, Issue 8, page no. ppc444-c453, August-2023, Available at : http://www.jetir.org/papers/JETIR2308251.pdf

Publication Details

Published Paper ID: JETIR2308251
Registration ID: 523179
Published In: Volume 10 | Issue 8 | Year August-2023
DOI (Digital Object Identifier):
Page No: c444-c453
Country: sagar, sagar, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

00080

Print This Page

Current Call For Paper

Jetir RMS