CFP last date
20 January 2025
Reseach Article

Trust Factor based LEACH-C protocol for Wireless Sensor Networks

by Geetha V, K. Chandrasekaran
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 105 - Number 18
Year of Publication: 2014
Authors: Geetha V, K. Chandrasekaran
10.5120/18700-9895

Geetha V, K. Chandrasekaran . Trust Factor based LEACH-C protocol for Wireless Sensor Networks. International Journal of Computer Applications. 105, 18 ( November 2014), 43-48. DOI=10.5120/18700-9895

@article{ 10.5120/18700-9895,
author = { Geetha V, K. Chandrasekaran },
title = { Trust Factor based LEACH-C protocol for Wireless Sensor Networks },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 105 },
number = { 18 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 43-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume105/number18/18700-9895/ },
doi = { 10.5120/18700-9895 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:38:07.019568+05:30
%A Geetha V
%A K. Chandrasekaran
%T Trust Factor based LEACH-C protocol for Wireless Sensor Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 105
%N 18
%P 43-48
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Trust in wireless sensor network is an essential feature to detect various kind of attacks in the network. Wireless sensor nodes are more prone to attacks as nodes are deployed in an open environment. In case of centralized low energy adaptive cluster head protocol cluster heads in each round are selected by sink node. We propose a trust factor based LEACH-C protocol, to detect malicious nodes based on trust calculations which involves observation of various parameters and evaluation of trust factors. Simulation is conducted in using NS-2, by varying the number of malicious nodes and results are analyzed for energy consumption, number of data packets sent and percentage of malicious node detection.

References
  1. Heinzelman,W, Chandrakasan, A, and Balakrishnan H. 2002, Energy-efficient communication protocols for wireless microsensor networks, Proceedings of the 33rd Hawaaian International Conference on Systems Science (HICSS), pp. 1-10.
  2. Yanli Yu, Keqiu Li,Wanlei Zhoui, Ping Li. 2012, Trust mechanisms in wireless sensor networks: Attacks analysis and countermeasures,”Journal of Network and Computer Applications, pp. 867-880.
  3. Fei Song, Baohua Zhao. 2008, Trust based LEACH protocol for wireless sensor networks, Proc. of the 2008 Second International Conference on Future Generation Communication and Networking, pp. 202-207.
  4. Mohammad Reza Rohbanian, Mohammad Rafi Kharazmi, Alireza Keshavarz-Haddad, Manije Keshtgary. Watchdog-LEACH: A new method based on LEACH protocol to secure clustered wireless sensor networks, http://arxiv.org/ftp/arxiv/papers/1310/1310.3637.pdf.
  5. Fenye Bao, Ing-ray Chen, Moonjeong Chang and Jin-hee Cho. 2011, Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection, Proc. of ACM Symposium on Applied Computing, pp 1732-1738.
  6. Geetha V, Pranesh V Kallapur, Sushma Tellajeera. 2012, Clustering in wireless sensor networks: Performance comparison of LEACH and LEACH-C protocols using NS2, Procedia Technology 4, pp 163-170.
  7. Meenakshi Tripathi, M.S. Gaur and V. Laxmi. 2013, Simulation of snooze attack in LEACH, AIRCCJ, Computer Science and Information Technology, CSCP, Volume 3,pp.393-399.doi:10.5121/csit.2013.3541.
  8. Shikha Magotra, Krishna Kumar. 2014, Detection of HELLO flood attack on LEACH protocol, Proc. of IEEE International Conference on Advanced Computing Conference(IACC), 2014, 193 - 198.
  9. Simerpreet Kaur, Md. Ataulla. 2014, Securing wireless sensor network from denial of sleep attack by isolating nodes, International Journal of Computer Applications, Vol 103, No-1, pp 29-33.
  10. Josang and R Ismail. 2002, The Beta reputation system, Proc. of the 15th Bled Electronic Commerce Conference. Bled, Slovenia.
  11. S Ganeriwal and M B Srivastava 2004, Reputation-based framework for high integrity sensor networks, Proc. of The 2nd ACM Workshop on Security of Ad-hoc and Sensor Networks Washington DC, USA.
  12. Network Simulator -2 (ns-2), http://www.isi.edu/nsnam/ns.
Index Terms

Computer Science
Information Sciences

Keywords

Centralized - Low Energy Adaptive Cluster Head protocol(LEACH-C) Trust management Trust Factors Wireless sensor networks