Detection & Isolation of Malicious Nodes in a WSN Using LEACH Protocol

Authors(3) :-Er. Himanshi Vashisht, Sanjay Bharadwaj, Sushma Sharma

A wireless sensor networks (WSN) is a recent advancement of technology of computer networks and electronics. They have a wide variety of applications ranging from data gathering to data transmission through wireless media. Along with these applications, WSN also has some weakness due to which its sensor nodes are vulnerable to most of the security threats. Denial-of-Service (DoS) attack is one of the most popular attack. This attack affects different layers of WSN and each layer has different type of DoS attack. A malicious node interferes in the system that needs to be detected and eliminated. For this we need a proper strategy. This is been studied in this paper.

Authors and Affiliations

Er. Himanshi Vashisht
CSE, Haryana Engineering College, Jagadhri, Haryana, India
Sanjay Bharadwaj
Computer, DAV College for girls, Yamunanagar, Haryana, India
Sushma Sharma
Computer, DAV College for girls, Yamunanagar, Haryana, India

DoS attack, LEACH protocol, Malicious nodes, Throughput

  1. I.F. Akyildiz, W. Su, Y. S. Subramaniam, E. Cayirci. "Wireless Sensor Networks: A Survey" Broadband and Wireless Networking Laboratory, School of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA 20 December 2001, pp. 392-422.
  2. R Sowmya, Mrs. Shoba. M," DETECTION AND PREVENTION OF MISDIRECTION ATTACK BY THIRD PARTY MONITORING IN WSN", 2000 IJRSE
  3. Roshan Singh Sachan, Mohammad Wazid, Avita Katal, D P Singh, R H Goudar," A Cluster-Based Intrusion Detection and Prevention Technique for Misdirection Attack inside WSN", 2013 IEEE 978-1-4673-4866-9/13/
  4. Hero Modraes, Rosli Salleh and Amir hossein Moravjosharieh, "Overview of Security Issues in Wireless Sensor Networks", Third International Conference on Computational Intelligence, Modelling and Simulation (CIM SIM), IEEE 2012, pp. 308-311.
  5. Roshan Singh Sachan, Mohammad Wazid, D.P. Singh, Avita Katal and R.H. Goudar, "Misdirection Attack in WSN: Topological Analysis and an Algorithm for Delay and Throughput Prediction", 2012 IEEE 978-1-4673-4603.
  6. Yi-Ying ZHANG, Xiang-Zhen LI, Yuan-an LIU, "The detection and defense of DoS attack for wireless sensor network", Elsevier Journal of China Universities of Posts and Telecommunications, Vol19, pp. 52-56, Oct-2012.
  7. Hossein Jadidoleslamy," A Hierarchical Intrusion Detection Architecture for wireless sensor networks", 2011 Vol.3, No.5.
  8. Teodar-Grigopou, "Main Types of Attacks in Wireless Sensor Network", Recent Advances in Signals and Systems, ISSN: 1790-5109, 2009.
  9. Dr. G. Padma vathi, Mrs. D. Shanmugapriya, "A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks", International Journal of Computer Science and Information Security, Vol. 4, No. 1 & 2, 2009, pp. 1-9.

Publication Details

Published in : Volume 3 | Issue 6 | July-August 2018
Date of Publication : 2018-07-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 324-328
Manuscript Number : CSEIT183666
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Er. Himanshi Vashisht, Sanjay Bharadwaj, Sushma Sharma, "Detection & Isolation of Malicious Nodes in a WSN Using LEACH Protocol ", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 6, pp.324-328, July-August-2018. |          | BibTeX | RIS | CSV

Article Preview