Authors :
DUSINGIZE Gilbert; Dr. Wilson MUSONI
Volume/Issue :
Volume 9 - 2024, Issue 11 - November
Google Scholar :
https://tinyurl.com/3fwx5pr2
Scribd :
https://tinyurl.com/3zbf4se6
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24NOV111
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
Wireless Sensor Network (WSN) is a spatially
distributed sensors that can monitor environmental and
exchange that information with each other over wireless
medium. Due to their energy restrictions, their limited
storage capability, and positioning in hostile
environments, WSNs are vulnerable to various routing
attacks. Sinkhole attack is the main issue in the said
wireless sensor network which permanently disable
sensor node by draining nodes battery power and drop
all packets and prevent it to reach the base station.
Cluster-based routing protocols are developed to
undertake this problem, and the Low Energy Adaptive
Clustering Hierarchy (LEACH) is one of the best-known
protocols of this type. It is very important to secure the
communication between nodes and prevent against
different attacks especially in cluster based WSN that
run LEACH routing protocol.
Therefore, this paper proposes an algorithm for
extending the lifetime of Wireless Sensor Network which
uses a clustering-based routing protocol namely LEACH
for its routing operation in IPRC-Huye Campus. The
proposed algorithm indicates the random election of
normal nodes and then flags the dead nodes at each
epoch and then increment accordingly. The cluster
head(CH) election is done by calculating the ratio of
optimal election probability and the modulation of
rounds. The dissipated energy is now obtained based on
the energy data aggregation and the distance between
nodes.
Above all, the simulation result is shown for the
proposed algorithm which is proven to be efficient
compared with the existing one, namely, LEACH, in
terms of minimum computational complexity and high
energy efficiency. Moreover, the algorithm was
numerically analyzed using MATLAB.
References :
- Abdullah, M. Y., et al.(2009). Energy scheduling with roles dormant cells in wireless sensor network. In Mechatronics and Automation, International Conference on IEEE, 541-545.
- Bakaraniya, P., & Mehta, S.(2013) K-LEACH: An improved LEACH Protocol for Lifetime Improvement in WSN. International Journal of Engineering Trends and Technology,4(5), 1521- 1526.
- Chugh, C., & Singh, R. A.(2013). Real-Time MATLAB based GUI for node placement and a shortest-path alternate route path algorithm in Wireless Sensor Networks. International Journal for Science and Emerging,7(1),11-16.
- C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks, vol. 1, no. 2-3, pp. 293–315, 2003.
- G. Padmavathi and D. Shanmugapriya, “A survey of attacks, security mechanisms and challenges in wireless sensor net works,” International Journal of Computer Science and Informa tion Security, vol. 4, no. 1-2, 2009.
- N. A. Alrajeh, S. Khan, and B. Shams, “Intrusion detection systems in wireless sensor networks: a review,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 167575, 7 pages, 2013.
- J. A. Chaudhry, U. Tariq, M. A. Amin, and R. G. Rittenhouse, “Dealing with sinkhole attacks in wireless sensor networks,” Advanced Science and Technology Letters, vol. 29, pp. 7–12, 2013.
- M. Dener, “Security analysis in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2014, Article ID 303501, 9 pages, 2014.
- S. A. Salehi, M. A. Razzaque, P. Naraei, and A. Farrokhtala, “Detection of sinkhole attack in wireless sensor networks,” in Proceedings of the 3rd IEEE International Conference on Space Science and Communication (IconSpace ’13), pp. 361–365, Melaka, Malaysia, July 2013.
- P. Maidamwar and N. Chavhan, “Impact of wormhole attack on performance of LEACH in wireless sensor networks,” Inter national Journal of Computer Networking, Wireless and Mobile Communications, vol. 3, no. 3, pp. 21–32, 2013.
- I. Krontiris, T. Dimitriou, T. Giannetsos, and M. Mpasoukos, “Intrusion detection of sinkhole attacks in wireless sensor network,” in Proceedings of the 3rd International Workshop on Algorithmic Aspects of Wireless Sensor Networks (AlgoSensors ’07), vol. 4837, pp. 150–161, Wrocław, Poland, 2007.
- S. Iqbal, S. P. Aravind Srinivas, G. Sudharsan, and S. S. Kashyap, “Comparison of different attacks on LEACH protocol inWSN,” International Journal of Electrical, Electronics and Data Communication, vol. 8, no. 8, pp. 16–19, 2014.
- X. Deng, R. Wu, W. Wang, and R. Bu, “An intrusion detection system for cluster based wireless sensor networks,” Information Technology Journal, vol. 12, no. 9, pp. 1764–1771, 2013.
- H. Shafiei, A. Khonsari, H. Derakhshi, and P. Mousavi, “Detec tion and mitigation of sinkhole attacks in wireless sensor networks,” Journal of Computer and System Sciences, vol. 80, no. 3, pp. 644–653, 2014.
- V. K. Jatav, M. Tripathi, M. S. Gaur, and V. Laxmi, “Wireless sensor networks: attack models and detection,” in Proceedings of IACSIT Hong Kong Conferences, vol. 30, pp. 144–150, 2012.
- M. Bahekmat, M. H. Yaghmaee, A. S. H. Yazdi, and S. Sadeghi, “A novel algorithm for detecting sinkhole attacks in WSNs,” International Journal of Computer Theory and Engineering, vol. 4, no. 3, pp. 418–421, 2012.
- F. Ye, G. Zhong, J. Cheng, S. Lu, and L. Zhang, “PEAS: a robust energy conserving protocol for long-lived sensor networks,” in Proceedings of the 23th IEEE International Conference on Distributed Computing Systems (ICDCS ’03), pp. 28–37, May 2003.
- W. Ye, J. Heidemann, and D. Estrin, “An energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of the IEEE Computer and Communications Societies (INFOCOM ’02), pp. 1567–1576, New York, NY, USA, June 2002.
- T. Van Dam and K. Langendoen, “An adaptive energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys ’03), pp. 171–180, Los Angeles, Calif, USA, November 2003.
- G. Lu, B. Krishnamachari, and C. S. Raghavendra, “An adaptive energy-efficient and low-latency MAC for data gathering in wireless sensor networks,” in Proceedings of 18th International Parallel and Distributed Processing Symposium (IPDPS ’04), pp. 3091–3098, April 2004.
- T. Zheng, S. Radhakrishnan, and V. Sarangan, “PMAC: an adaptive energy-efficient MAC protocol for wireless sensor networks,” in Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS ’05), p. 237, April 2005.
- J. Polastre, J. Hill, and D. Culler, “Versatile low power media access for wireless sensor networks,” in Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys ’04), pp. 95–107, November 2004.
- M. Buettner, G. V. Yee, E. Anderson, and R. Han, “X-MAC: a short preamble MAC protocol for duty-cycled wireless sensor networks,” in Proceedings of the 4th International Conference on Embedded Networked Sensor Systems (SenSys’ 06), pp. 307–320, November 2006.
- A. El-Hoiydi and J. D. Decotignie, “WiseMAC: an ultra low power MAC protocol for multi-hop wireless sensor networks,” in Proceedings of the 1st International Workshop on Algorithm Aspects of Wireless Sensor Networks, vol. 3121 of Lecture Notes in Computer Science, pp. 18–31, 2004.
- E. Shih, S. H. Cho, N. Ickes et al., “Physical layer driven proto col and algorithm design for energy-efficient wireless sensor networks,” in Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MOBICOM ’01), pp. 272–286, July 2001.
- S. Kumar, T. H. Lai, and J. Balogh, “On k-coverage in a mostly sleeping sensor network,” in Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (MOBICOM ’04), pp. 144–158, October 2004.
- P. Berman, G. Calinescu, C. Shah, and A. Zelikovsky, “Power efficient monitoring management in sensor networks,” in Pro ceedings of the IEEE Wireless Communications and Networking Conference (WCNC ’04), pp. 2329–2334, 2004.
- W. R. Heinzelman, A. Chandrakasan, and H. Balakrish nan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Siences (HICSS ’00), p. 223, January 2000.
- A. Sinha and A. Chandrakasan, “Dynamic power management in wireless sensor networks,” IEEE Desig
- S. Athmani, D. E. Boubiche, and A. Bilami, “Hierarchical energy efficient intrusion detection system for black hole attacks in WSNs,” in Proceedings of the World Congress on Computer and Information Technology, pp. 1–5, June 2013.
- M. Tripathi, M. S. Gaur, and V. Laxmi, “Comparing the impact of black hole and gray hole attack on LEACH in WSN,” in Proceedings of 4th International Conference on Ambient Systems, Networks and Technologies (ANT ’13), vol. 19, pp. 1101–1107, June 2013.
Wireless Sensor Network (WSN) is a spatially
distributed sensors that can monitor environmental and
exchange that information with each other over wireless
medium. Due to their energy restrictions, their limited
storage capability, and positioning in hostile
environments, WSNs are vulnerable to various routing
attacks. Sinkhole attack is the main issue in the said
wireless sensor network which permanently disable
sensor node by draining nodes battery power and drop
all packets and prevent it to reach the base station.
Cluster-based routing protocols are developed to
undertake this problem, and the Low Energy Adaptive
Clustering Hierarchy (LEACH) is one of the best-known
protocols of this type. It is very important to secure the
communication between nodes and prevent against
different attacks especially in cluster based WSN that
run LEACH routing protocol.
Therefore, this paper proposes an algorithm for
extending the lifetime of Wireless Sensor Network which
uses a clustering-based routing protocol namely LEACH
for its routing operation in IPRC-Huye Campus. The
proposed algorithm indicates the random election of
normal nodes and then flags the dead nodes at each
epoch and then increment accordingly. The cluster
head(CH) election is done by calculating the ratio of
optimal election probability and the modulation of
rounds. The dissipated energy is now obtained based on
the energy data aggregation and the distance between
nodes.
Above all, the simulation result is shown for the
proposed algorithm which is proven to be efficient
compared with the existing one, namely, LEACH, in
terms of minimum computational complexity and high
energy efficiency. Moreover, the algorithm was
numerically analyzed using MATLAB.