2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) 2016
DOI: 10.1109/wispnet.2016.7566424
|View full text |Cite
|
Sign up to set email alerts
|

SSLEACH: Specification based secure LEACH protocol for Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Hima and Rama et al 23 proposed a lightweight secure and energy-saving LEACH protocol (LS-LEACH), which integrates broadcast authentication algorithms to authenticate users. Kumar and Umamakeswari 24 proposed a general specification-based intrusion detection model (SS-LEACH). SS-LEACH uses signature-based broadcast authentication to distribute code and data, which improves security, but requires high computational complexity.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Hima and Rama et al 23 proposed a lightweight secure and energy-saving LEACH protocol (LS-LEACH), which integrates broadcast authentication algorithms to authenticate users. Kumar and Umamakeswari 24 proposed a general specification-based intrusion detection model (SS-LEACH). SS-LEACH uses signature-based broadcast authentication to distribute code and data, which improves security, but requires high computational complexity.…”
Section: Related Workmentioning
confidence: 99%
“…The purpose of the experiments was to evaluate the performance of the SLEB compared to the other protocols or technology such as S-LEACH, MS-LEACH, and SS-LEACH. 24 To simplify the simulation experiment, we generated random nodes and defined some of them as malicious nodes. In the following sections, we measured the packet forwarding ratio, protocol overhead, and network lifetime by malicious attacks during data forwarding for CHs in WSNs, 23 and for different scenarios, we then show the following simulation results.…”
Section: Performance Simulationmentioning
confidence: 99%
“…However, this security solution is not effective against insider attacks, and it is not energy efficient. [31] proposes a specificationbased protocol that deals with security measures for authentications and to avoid sinkhole attacks, because there is no CH or non-CH authentication in LEACH, which makes a network vulnerable to attacks. However, SS-LEACH does not protect against node compromise.…”
Section: B Secure Leach Protocolsmentioning
confidence: 99%