UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 6 Issue 1
January-2019
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIRFT06062


Registration ID:
501808

Page Number

320-325

Share This Article


Jetir RMS

Title

In WSN, Comparing the Effects of a Black Hole versus a Gray Hole Attack on LEACH

Abstract

The implementation of Wireless Sensor Networks (WSNs) in an unsupervised environment has resulted in a slew of security issues. This paper examines LEACH, the most widely used clustered routing protocol in WSNs, and how it may be hacked by Black Hole and Gray Hole attackers. To mimic these assaults on NS-2, the “high energy threshold” idea is utilized. The performance of a WSN under assault is extensively examined by putting it through its paces using a variety of network settings and node densities. It has been discovered that the Black Hole attack has a greater impact on network performance than the Gray Hole assault. WSNs are gaining popularity in a variety of fields, including military applications, environmental applications, smart homes, health monitoring, and so on. Any physical, mechanical, or chemical change in the environment is detected by the nodes of a WSN and sent to the base station, where the user may evaluate the findings. WSNs have a number of resource constraints, including memory, computing power, and battery life. Sensor nodes conduct substantial signal processing, calculation, and aggregation locally before sending the data to the base station, which reduces transmission and therefore energy costs. One of the most common routing protocols is cluster-based Low-Energy Adaptive Clustering Hierarchy (LEACH) , which equally distributes the energy burden across the different sensor nodes. All cluster members must submit data to the cluster head, which will aggregate and compress the data before sending it to the base station. All communication between nodes in WSNs is done wirelessly, and the nodes are so resource constrained that using security methods from other ad hoc networks is impossible. As a result, malicious nodes are more inclined to attack them. If the attacker becomes the cluster leader, the assault has a greater impact.

Key Words

WSN, cluster, LEACH, Black Hole attack, Gray Hole attack, NS2

Cite This Article

"In WSN, Comparing the Effects of a Black Hole versus a Gray Hole Attack on LEACH", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.6, Issue 1, page no.320-325, January-2019, Available :http://www.jetir.org/papers/JETIRFT06062.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"In WSN, Comparing the Effects of a Black Hole versus a Gray Hole Attack on LEACH", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.6, Issue 1, page no. pp320-325, January-2019, Available at : http://www.jetir.org/papers/JETIRFT06062.pdf

Publication Details

Published Paper ID: JETIRFT06062
Registration ID: 501808
Published In: Volume 6 | Issue 1 | Year January-2019
DOI (Digital Object Identifier):
Page No: 320-325
Country: -, -, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000175

Print This Page

Current Call For Paper

Jetir RMS