LS-LEACH: A New Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks

Wireless sensor networks are facing many challenges such as the limited resource in processing power, storage and energy. The limited energy resource is one of the main challenges facing the security in such networks. This paper aims to improve the current security mechanisms in wireless sensor networks as well as reducing power consumption. LEACH protocol provides an energy routing protocol. However, it doesn't cover the security problems. Alternatively, this paper aims to provide an improved secure and more energy efficient routing protocol called LS-LEACH (Lightweight Secure LEACH). Authentication algorithm is integrated to assure data integrity, authenticity and availability. Furthermore, this paper shows the improvement over LEACH protocol that makes it secure and how to make it more energy efficient to reduce the effect of the overhead energy consumption from the added security measures.

[1]  Tassos Dimitriou,et al.  Providing Transparent Security Services to Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[2]  Rosli Salleh,et al.  Overview of Security Issues in Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.

[3]  Victor Cionca,et al.  On the (im)possibility of denial of service attacks exploiting authentication overhead in WSNs , 2009, 2009 IEEE Sensors Applications Symposium.

[4]  Yang Xin,et al.  A Novel Framework of Defense System Against DoS Attacks in Wireless Sensor Networks , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[5]  Eman Shaaban,et al.  Enhancing S-LEACH security for wireless sensor networks , 2012, 2012 IEEE International Conference on Electro/Information Technology.

[6]  A. Bouayad,et al.  Wireless sensor network: Security challenges , 2012, 2012 National Days of Network Security and Systems.

[7]  Srinivas Sampalli,et al.  A robust pair-wise and group key management protocol for wireless sensor network , 2010, 2010 IEEE Globecom Workshops.

[8]  M. V. Ramesh,et al.  Wireless Sensor Network Security: Real-Time Detection and Prevention of Attacks , 2012, 2012 Fourth International Conference on Computational Intelligence and Communication Networks.

[9]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[10]  Deborah Estrin,et al.  Medium access control with coordinated adaptive sleeping for wireless sensor networks , 2004, IEEE/ACM Transactions on Networking.

[11]  Huirong Fu,et al.  Design and implementation of an intrusion detection system for wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.

[12]  Bai Li,et al.  Using Mobile Agents to Detect Node Compromise in Path-Based DoS Attacks on Wireless Sensor Networks , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[13]  Ricardo Dahab,et al.  SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[14]  Nicolae Tapus,et al.  Authentication and Anti-replay Security Protocol for Wireless Sensor Networks , 2010, 2010 Fifth International Conference on Systems and Networks Communications.

[15]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[16]  Wendi Heinzelman,et al.  Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .

[17]  M. Guechari,et al.  Dynamic solution for detecting Denial of Service attacks in wireless sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[18]  Ting Peng,et al.  Improvement of LEACH protocol for WSN , 2012, 2012 9th International Conference on Fuzzy Systems and Knowledge Discovery.

[19]  Chen Xin,et al.  Sleep-Wakeup Mechanism of Belt Sensor Network for Fence Anti-Intrusion , 2011, 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing.

[20]  Hwang Soo Lee,et al.  Wireless sensor network design for tactical military applications : Remote large-scale environments , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[21]  Andreas Pitsillides,et al.  Vulnerability assessment of intrusion recovery countermeasures in wireless sensor networks , 2011, 2011 IEEE Symposium on Computers and Communications (ISCC).