• DocumentCode
    725288
  • Title

    An algorithm to detect malicious nodes in wireless sensor network using enhanced LEACH protocol

  • Author

    Das, Semanti ; Das, Abhijit

  • Author_Institution
    Dept. of Inf. Technol., RCC Inst. of Inf. Technol., Kolkata, India
  • fYear
    2015
  • fDate
    19-20 March 2015
  • Firstpage
    875
  • Lastpage
    881
  • Abstract
    Wireless sensor network comprises of small sensor nodes with limited resources. Typical applications of sensor network are Weather monitoring, Civil Applications, Battle field monitoring, Intrusion Detection etc. These sensor networks have limitations of system resources like battery power, communication range and processing capability. Low processing power and wireless connectivity make such networks vulnerable to various types of network attacks. Sensor network uses Low Energy Adaptive Clustering Hierarchy (LEACH), which is a TDMA based MAC protocol that balances the clustering energy, hence the network lifetime is prolonged. As the Cluster-heads are selected randomly so there are some disadvantages regarding LEACH protocol such as if once the CH dies the whole network fails. Hence we propose a new approach in cluster-head selection. In our approach, a modified cluster-head selection algorithm has been proposed based on remaining battery life and distance and detection of malicious nodes in an effective way so that no attack can ruin the normal network operation.
  • Keywords
    access protocols; pattern clustering; signal detection; time division multiple access; wireless sensor networks; LEACH protocol enhancement; TDMA based MAC protocol; battle field monitoring; civil applications; cluster head selection; clustering energy balancing; intrusion detection; low energy adaptive clustering hierarchy; weather monitoring; wireless connectivity; wireless sensor network failure; wireless sensor network malicious node detection algorithm; Base stations; Batteries; Computers; Floods; Monitoring; Protocols; Wireless sensor networks; Cluster-head; Detection Techniques; LEACH; Malicious nodes; Wireless Sensor Networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Engineering and Applications (ICACEA), 2015 International Conference on Advances in
  • Conference_Location
    Ghaziabad
  • Type

    conf

  • DOI
    10.1109/ICACEA.2015.7164828
  • Filename
    7164828