International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 133 | Views: 272

Research Paper | Computer Science & Engineering | India | Volume 6 Issue 12, December 2017 | Popularity: 6.5 / 10


     

Leach Protocol in Wireless Sensor Network

Tegendra Sahu, Abhishek Badholia


Abstract: Wireless Sensor Network (WSN) is a network comprises of vast number of low power sensor hubs. LEACH is a less vitality versatile protocol. The primary objective of cluster based sensor systems is to minimize framework delay and reduce energy utilization. LEACH is based on clustering technique for micro sensors which can able to achieve scalable routing, energy efficient and fair routing for sensor nodes. Numerous enhancements are done in wireless sensor network. Security is exceptionally fundamental in remote sensor arrange. This paper reviews LEACH convention, their preferences, drawbacks and so forth. This paper also presents some the attacks on LEACH protocol and its consequences and effect on sensor nodes. This paper proposes a novel mechanism for dealing with WSN sensors in case of attacks using Basic Leach, M-Leach and Leach-B. The proposed mechanism outperforms the existing ones like basic leach protocol.


Keywords: LEACH Protocol, Attacks, Wireless Sensor Networks, Routing, Security


Edition: Volume 6 Issue 12, December 2017


Pages: 808 - 813



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Tegendra Sahu, Abhishek Badholia, "Leach Protocol in Wireless Sensor Network", International Journal of Science and Research (IJSR), Volume 6 Issue 12, December 2017, pp. 808-813, https://www.ijsr.net/getabstract.php?paperid=ART20178825, DOI: https://www.doi.org/10.21275/ART20178825



Similar Articles

Downloads: 105

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1751 - 1754

Joining Delay; Packet Delivery and Limitations of EGMP

G. Anandhi, Dr. S. K. Srivatsa

Share this Article

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 629 - 634

A Face Spoof Detection using Feature Extraction and SVM

Lovely Pal, Renuka Singh

Share this Article
Top