An algorithm to detect malicious nodes in wireless sensor network using enhanced LEACH protocol

Wireless sensor network comprises of small sensor nodes with limited resources. Typical applications of sensor network are Weather monitoring, Civil Applications, Battle field monitoring, Intrusion Detection etc. These sensor networks have limitations of system resources like battery power, communication range and processing capability. Low processing power and wireless connectivity make such networks vulnerable to various types of network attacks. Sensor network uses Low Energy Adaptive Clustering Hierarchy (LEACH), which is a TDMA based MAC protocol that balances the clustering energy, hence the network lifetime is prolonged. As the Cluster-heads are selected randomly so there are some disadvantages regarding LEACH protocol such as if once the CH dies the whole network fails. Hence we propose a new approach in cluster-head selection. In our approach, a modified cluster-head selection algorithm has been proposed based on remaining battery life and distance and detection of malicious nodes in an effective way so that no attack can ruin the normal network operation.

[1]  Liang Chen,et al.  An Improved LEACH for Clustering Protocols in Wireless Sensor Networks , 2010, 2010 International Conference on Measuring Technology and Mechatronics Automation.

[2]  Hu Han-ying,et al.  An Improved LEACH Protocol for Data Gathering and Aggregation in Wireless Sensor Networks , 2008, 2008 International Conference on Computer and Electrical Engineering.

[3]  Soumya K. Ghosh,et al.  An Approach for Security Assessment of Network Configurations Using Attack Graph , 2009, 2009 First International Conference on Networks & Communications.

[4]  Liu Jun,et al.  A modified LEACH algorithm in wireless sensor network based on NS2 , 2012, 2012 International Conference on Computer Science and Information Processing (CSIP).

[5]  Dirk Timmermann,et al.  Low energy adaptive clustering hierarchy with deterministic cluster-head selection , 2002, 4th International Workshop on Mobile and Wireless Communications Network.

[6]  Lei Wei,et al.  Improving the leach protocol for wireless sensor networks , 2010 .

[7]  Jian-Feng Yan,et al.  Improved LEACH routing protocol for large scale wireless sensor networks routing , 2011, 2011 International Conference on Electronics, Communications and Control (ICECC).

[8]  Mario Gerla,et al.  Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..

[9]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[10]  Wang Sheng,et al.  Performance Comparison of LEACH and LEACH-C Protocols by NS2 , 2010, 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.

[11]  Abraham O. Fapojuwo,et al.  A centralized energy-efficient routing protocol for wireless sensor networks , 2005, IEEE Communications Magazine.

[12]  Rajashekhar C. Biradar,et al.  A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).