Paper Title :Comparison Of Different Attacks On Leach Protocol In WSN
Author :Siddiq Iqbal, Aravind Srinivas S P, Sudarshan G, Sagar S Kashyap
Article Citation :Siddiq Iqbal ,Aravind Srinivas S P ,Sudarshan G ,Sagar S Kashyap ,
(2014 ) " Comparison Of Different Attacks On Leach Protocol In WSN " ,
International Journal of Electrical, Electronics and Data Communication (IJEEDC) ,
pp. 16-19,
Volume-2,Issue-8
Abstract : Wireless sensor networks consists of large number of small, low cost and energy dependent sensors which are
deployed to monitor many physical parameters such as temperature, pressure, vibration, motion etc. Several protocols are
employed in WSN in order to reduce the amount of energy consumed. One such protocol is the hierarchical protocol called
LEACH. The nature of LEACH protocol is prone to attacks. In this paper comparison of two such attacks namely Blackhole
and Sinkhole on the LEACH protocol is performed and the simulated results are shown.
Type : Research paper
Published : Volume-2,Issue-8
DOIONLINE NO - IJEEDC-IRAJ-DOIONLINE-1088
View Here
Copyright: © Institute of Research and Journals
|
|
| |
|
PDF |
| |
Viewed - 60 |
| |
Published on 2014-08-01 |
|