Professional Documents
Culture Documents
IJTRD1298
IJTRD1298
net/publication/288315770
CITATIONS READS
0 116
2 authors, including:
Souvik Chatterjee
University of Engineering & Management, Kolkata, India
13 PUBLICATIONS 82 CITATIONS
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Souvik Chatterjee on 27 December 2015.
Abstract: Wireless sensor networks embodies of small, sensor in the network. This paper used LEACH routing
inexpensive and shallow power sensor nodes with limited protocol to increase the network life time. Due to
resources, uses in many paramount application like forest application of WSNs in mission critical areas, secured
fire detection, remote patient monitoring in medicine, message communication is very important, for that
battlefield surveillance etc. But the efficiency of sensor different security mechanism have been developed. This
networks strongly clings to routing protocol. Due to paper proposed an algorithm to detect malicious node
application of Wireless Sensor Network (WSN) in critical using secured LEACH protocol in WSNs which ensures
areas secure message communication and fresh data is data freshness and analysis the performance by
very important. This work shows an algorithm which comparing the results between two secure LEACH
depicts secured routing protocol ensuring data freshness algorithms.
in WSN. This work not only reveals the secured message
This manuscript is organized as follows. Section 2
communication but also accepts fresh data.
contains related work. In Section 3, it implements the
Keywords: Security, Attack, Routing, Cluster, Temporal proposed work. Section 4 has given comparative
Leashes, Data Freshness. experiment results. Section 5 draws conclusion and
contains reference papers.
I. INTRODUCTION
II. RELATED WORK
Wireless sensor nodes consist of distributed autonomous
A lot of research work carried out in wireless sensor
sensor to monitor physical or environmental conditions
networks. Initially this section describes different security
and co-operatively pass their data to the base station
mechanism in wireless sensor networks and later this
through the network. These sensor nodes can sense,
paper proposed a new secure algorithm.
measure and gather information from the environment
and transit the sensed data to the base station. Sensor Cluster routing model is efficient model still there are
replacing man power which can be deployed where some issues. Wang Xiao-yunet. al. [12] proposed
human interaction is not possible. Due to the broadcast SLEACH: Secure Low Energy Adaptive Clustering
nature of transmission medium wireless sensor network Hierarchy. Here SLEACH is implemented using
vulnerable to security attacks like wormhole attack, inexpensive symmetric key. SLEACH provide security in
replay attack, selective forwarding attack etc. LEACH by using the building block of SPINS (security
protocol for sensor networks).SLEACH protects against
Routing protocol is used to increase the efficiency of
different type of attacks but SLEACH cannot prevent to
WSN. Cluster based routing protocol is suitable for WSN
crow the time slot schedule of a cluster and does not
because it gives a good organization of networks nodes
guarantee data confidentiality. Cluster could not change
resources and ensures efficient routing. Low Energy
dynamically and it does not provide more nodes, which
Adaptive Clustering Hierarchy routing protocol
are nearer to base station to distribute high overhead.
(LEACH) is the first network routing protocol that uses
hierarchical routing for Wireless Sensor Networks to Nishant Sharma et.al.[13] proposed various approaches to
increase the life time of network. All the nodes in a detecting wormhole attacks in WSNs. In this paper a time
network organize themselves into local clusters, with one based approach is used to detect malicious node. In this
node acting as the cluster head. All non-cluster head approach the sending node includes in the packet the time
nodes transmit their data to the cluster-head, while the at which it send the packet ts. When receiving a packet,
cluster head node receive data from all the cluster the receiving node compares this value to the time at
members, performs signal processing functions on the which it received the packet. tr. The receiver is thus able
data and transmit data to the remote base station. LEACH to detect the malicious node. But this approach does not
incorporates randomized rotation of the high energy ensures data freshness that means it cannot prevent replay
cluster head position such that it rotates among the attack. It does not ensures data is recent.
sensors in order to avoid draining the battery of any one
Sencun Zhu et. al. [19] worked on a LEAP: Efficient te =ts +L/C -
Security Mechanisms for Sensor Networks. A sensor Where, L=Prevents the packet from travelling further
network is self-possessed of a huge amount of sensor than distance L, C= Propagation speed of wireless signal
nodes. LEAP, is a key management protocol for sensor and = Clock synchronization error.
network that is designed to support in-network
START
READ r,p
YES NO
IF(r>0)
CALCULATE T(S)=p/(1-p*(r%(1/p)))
NO
IFRAND<T(S)?
YES
NO
WAIT FOR PACKET FROM SEND PACKET TO CH
SENSOR NODE
MALICIOUS=MALICIOUS+1
NO IF PACKET
RECENT?
YES
r=r-1
END