2012 IEEE International Conference on Electro/Information Technology 2012
DOI: 10.1109/eit.2012.6220698
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing S-LEACH security for wireless sensor networks

Abstract: Abstract² Developing effective security solutions for wireless sensor networks (WSN) are not easy due to limited resources of WSNs and the hazardous nature of wireless medium. The implementation of encryption/decryption algorithms which are the most essential part of the secure communication can be very intricate in WSNs since they incorporate routines that having very complex and intense computing procedures. A secure clustering protocol that achieves the desired security goals while keeping an acceptable lev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(25 citation statements)
references
References 11 publications
0
21
0
Order By: Relevance
“…It incorporates data fusion into the routing protocols to reduce the amount of information to be transferred to the (BS). Modified LEACH has been proposed in previous studies [9][10][11][12][13][14]. Farooq-et al, [10] proposed a Multi-hop Routing LEACH (MR-LEACH) protocol that divides the network into various cluster layers, wherein every cluster collaborates with BS to conserve energy.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…It incorporates data fusion into the routing protocols to reduce the amount of information to be transferred to the (BS). Modified LEACH has been proposed in previous studies [9][10][11][12][13][14]. Farooq-et al, [10] proposed a Multi-hop Routing LEACH (MR-LEACH) protocol that divides the network into various cluster layers, wherein every cluster collaborates with BS to conserve energy.…”
Section: Related Workmentioning
confidence: 99%
“…Simulation result shows that M-LEACH performs effectively in prolonging the network life_time and improves the data transmission efficiency. ElSaadawy and Shaaban [14] proposed Modified S-LEACH (MS-LEACH) to enhance the security of the existing LEACH. This technique includes data confidentiality between node and cluster head using pair wise keys shared between CHs and their cluster members.…”
Section: Related Workmentioning
confidence: 99%
“…On the other hand, the other proposed protocols based on LEACH tried to only add overhead cost on the network without trying to save the network energy which reduced the network life time [4,7,20]. Furthermore, we used CBC MAC with 4 bytes (2 32 ) which is a reasonable authentication protocol as the sensor wouldn't stand a bruteforce attack with 2 32 attempts.…”
Section: Comparision With Other Protocolsmentioning
confidence: 99%
“…However, assuring data confidentiality, authenticity, availability, and integrity must be maintained. Security is one of the challenging aspects in wireless networks because it has effect on the sensors resource due to the very limited resources in the wireless sensors [3,4]. Mobile and ad-hoc networks employ conventional security.…”
Section: Introductionmentioning
confidence: 99%
“…When the last node completes its transmission then the schedule is repeated. Leach is a cluster based protocol in which cluster head rotates randomly to evenly distribute the energy among the nodes in the network [14]. Leach protocol works in various rounds.…”
Section: Leach Protocolmentioning
confidence: 99%