z-logo
open-access-imgOpen Access
Simulation of Snooze Attack in Leach
Author(s) -
Meenakshi Tripathi,
Manoj Singh Gaur,
Vijay Laxmi
Publication year - 2013
Publication title -
computer science and information technology ( cs and it )
Language(s) - English
Resource type - Conference proceedings
DOI - 10.5121/csit.2013.3541
Subject(s) - computer science , computer security
Wireless Sensor Network (WSN) consists of large num\udber of sensor nodes capable of forming \udinstantaneous network with dynamic topology. Each \udnode simultaneously as both router and \udhost. Number of nodes in a WSN can vary either due \udto the mobility or death of nodes due to \uddrained conditions. Low Energy Aware Cluster Hierar\udchy (LEACH) is a most popular dynamic \udclustering protocol for WSN. Deployment in unattend\uded environment, limited memory, limited \udpower and low computational power of a sensor node \udmake these networks susceptible to \udattacks launched by malicious nodes. This paper pro\udvides an overview of LEACH protocol and \udhow LEACH can be compromised by malicious nodes. We\ud propose a attack on LEACH – \udSnooze attack. This paper we present a way to simul\udate this attack on NS-2 which is \uddemonstrative on throughput. We observe that during\ud simulation throughput drops as an effect \udof attack. It is observed that the effect of the at\udtack gets aggregated as we increase the number \udof attackers

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here