Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Performance analysis of LEACH with gray hole attack in Wireless Sensor Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Renold, A.P. ; TIFAC-CORE in Pervasive Comput. Technol., Velammal Eng. Coll., Chennai, India ; Poongothai, R. ; Parthasarathy, R.

Wireless Sensor Network (WSN) is a large network of sensor nodes, which operates in low power and capable of transmitting to a shorter distance with low bandwidth. It comprises of sensing unit, processing unit, memory unit, power supply and transceiver. As these sensor nodes are battery operated, the lifetime of the sensor node depends on the life of the battery. The sensor nodes in the network communicate in a mesh and multi-hop fashion, redundant data may exist in the network. In order to enhance the robustness and accuracy of the information obtained by the network, redundancy has to be reduced. One such protocol which works on the basis of data fusion to reduce redundant data is LEACH (Low Energy Adaptive Clustering Hierarchy). The LEACH protocol uses limited energy thus increases the network lifetime. The security of information transfer via wireless network is a challenging issue. In order to check the reliable operation of LEACH routing protocol, we implemented gray hole attack and evaluated the performance of the LEACH protocol in terms of metrics like packet drop ratio, throughput and Average End-to-End delay. The evaluation of LEACH with Gray hole attack has been done with the help of Ns2 simulator.

Published in:

Computer Communication and Informatics (ICCCI), 2012 International Conference on

Date of Conference:

10-12 Jan. 2012