Improving Energy Efficiency and Security of LEACH Routing Protocol against Black Hole Attack in Wireless Sensor Network
No Thumbnail Available
Date
2021-12
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Addis Ababa University
Abstract
A Wireless sensor network (WSN) consists of masses of tiny sensor nodes working in a
cooperative manner that sense the physical or environmental circumstances and send this information
to the base station. WSN has different constraints due to limited sensor nodes resources,
lack of central control, and unreliable communication of routing protocol used in WSN. Sensor
nodes in WSN have limited resources such as memory capacity, storage space, and energy.
These resource constraints in WSN lead to the limitations to implement the most commonly
used cryptography algorithm to secure WSNs. Nowadays, secured data transferring and reducing
energy dissipation of sensor nodes is the main challenge in WSNs. A black hole attack is
one of the security challenges in WSN at the network layer in Low-Energy Adaptive Clustering
Hierarchy (LEACH) routing protocol.
Several scholars proposed energy-efficient and security schemes that enhanced the LEACH
routing protocol. But there is a gap in addressing both energy efficiency and and black hole
attack issues at the same time in the LEACH routing protocol during cluster head(CH) selection.
This paper improves the energy efficiency and security of the LEACH routing protocol
when CH is selected. The energy efficiency improved by modifying the parameters of the cluster
head selection algorithm for threshold function. And also, the security issue of the black
hole attack detected and prevented based on the behaviors of the sensor node shown in the
network when the sensor nodes request to participate in the CHs selection process at the setup
phase in LEACH. Unlike LEACH routing protocol, the modified threshold function for CH
selection algorithm of proposed routing protocol includes the parameters of residual energy of
sensor node, the average residual energy of networks, and distance between the sensor node
and base station (BS) to calculate the threshold value. The CH selection algorithm decides
whether sensor nodes are selected as CHs or not in the network depending on the threshold
value. This improvement extends the network lifetime and transmits reliable data in WSN. According
to the simulation result, the proposed protocol reduces the energy usage of WSN and
minimizes the probability of malicious nodes selected as cluster heads in the LEACH routing
protocol.The proposed routing protocol improves the LEACH routing by an average of 34.67%,
28.43% 237.65% and 21.676% in terms of residual energy, network lifetime, packet sent to BS
and throughput’s respectively. After implementing security solution on the proposed LEACH it
improved by 1.88% in terms number of packet sent to BS under malicious attack. The proposed
routing protocol for WSNs simulation was conducted with MATLAB on two scenarios.
Description
Keywords
Energy-efficient and Secure LEACH, Cluster Head Selection Algorithm, Black Hole Attacks in WSN, Black Hole Attack Detection, Threshold Function.