Secure low energy adaptive clustering hierarchal based on internet of things for wireless sensor network (WSN): Survey

Internet of Things (IoT) allows different objects connect with each other through the Internet without any human's interaction. Wireless sensor network (WSN) is small sensor nodes that are densely deployed in places that are impossible to contain wired cables, it is considered as one of the IoT examples that focus on how sensors can monitor in several domains. The most WSN problems are focused on its battery power limitation that motivates the Hierarchical routing protocol to be used. Hierarchical routing protocol aims to reduce the usage of the network energy and to increase its lifetime. One of the most common Hierarchical routing protocols is the Low energy Adaptive Clustering Hierarchical routing protocol (LEACH) that deals with the security challenge. The security is one of the critical issues in WSN especially in the LEACH in term how to secure the content of the transmitted data and how to transmit these data in a secure manner to solve the attacks that it deals with, this survey focuses on how to secure LEACH using many methods that will also improve the LEACH itself.

[1]  Anurag Agarwal,et al.  The Internet of Things—A survey of topics and trends , 2014, Information Systems Frontiers.

[2]  Subhas Mukhopadhyay,et al.  WSN- and IOT-Based Smart Homes and Their Extension to Smart Buildings , 2015, Sensors.

[3]  Vikrant Chole,et al.  Secure Data Aggregation Technique in Wireless Sensor Network: A Survey , 2015 .

[4]  Surabhi Singh,et al.  Secure Routing in Wireless Sensor Networks: A Review , 2015 .

[5]  Felix Wortmann,et al.  Internet of Things , 2015, Business & Information Systems Engineering.

[6]  S Mayur,et al.  Security Enhancment on LEACH ProtocolFrom HELLO Flood Attack in WSN UsingLDK Scheme , 2015 .

[7]  Shreesha Bhat,et al.  Energy Efficient Clustering Routing Protocol based on LEACH for WSN , 2015 .

[8]  J. Manikandan,et al.  Secure and Efficient Data Transmission in Wireless Sensor Networks , 2018 .

[9]  Shadi Aljawarneh,et al.  A web engineering security methodology for e-learning systems , 2011, Netw. Secur..

[10]  V. Upadhyay,et al.  A survey of LEACH based routing protocols for WSN , 2016 .

[11]  Rajendra Prasad Mahapatra,et al.  Descendant of LEACH Based Routing Protocols in Wireless Sensor Networks , 2015 .

[12]  Mehwish Mumtaz,et al.  Energy Aware Routing Using Improved LEACH Protocol , 2015 .

[13]  Sayeed Yasin,et al.  Ensuring Secure and Efficient Data Transmission in Cluster-based Wireless Sensor Networks , 2015 .

[14]  Sencun Zhu,et al.  SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.

[15]  nbspSasikala S.D,et al.  Improving the Energy Efficiency of Leach Protocol Using VCH in Wireless Sensor Network , 2015 .

[16]  Nirav M. Raja,et al.  Secure End to End Data Aggregation using Public Key Encryption in Wireless Sensor Network , 2015 .

[17]  Shadi Aljawarneh,et al.  Cloud Security Engineering: Avoiding Security Threats the Right Way , 2011, Int. J. Cloud Appl. Comput..

[18]  Si Gwan Kim Reliable Random Key Pre-Distribution Schemes for Wireless Sensor Networks , 2015 .

[19]  Amanpreet Kaur,et al.  A Survey on Descendants of LEACH Protocol , 2016 .

[20]  JAMAL N. AL-KARAKI,et al.  Routing techniques in wireless sensor networks: a survey , 2004, IEEE Wireless Communications.

[21]  Meena Ahlawat Prolonging Lifetime of Wireless Sensor Network using Evolutionary Algorithms , 2015 .