Improving Energy Efficiency and Security of LEACH Routing Protocol against Black Hole Attack in Wireless Sensor Network

No Thumbnail Available

Date

2021-12

Journal Title

Journal ISSN

Volume Title

Publisher

Addis Ababa University

Abstract

A Wireless sensor network (WSN) consists of masses of tiny sensor nodes working in a cooperative manner that sense the physical or environmental circumstances and send this information to the base station. WSN has different constraints due to limited sensor nodes resources, lack of central control, and unreliable communication of routing protocol used in WSN. Sensor nodes in WSN have limited resources such as memory capacity, storage space, and energy. These resource constraints in WSN lead to the limitations to implement the most commonly used cryptography algorithm to secure WSNs. Nowadays, secured data transferring and reducing energy dissipation of sensor nodes is the main challenge in WSNs. A black hole attack is one of the security challenges in WSN at the network layer in Low-Energy Adaptive Clustering Hierarchy (LEACH) routing protocol. Several scholars proposed energy-efficient and security schemes that enhanced the LEACH routing protocol. But there is a gap in addressing both energy efficiency and and black hole attack issues at the same time in the LEACH routing protocol during cluster head(CH) selection. This paper improves the energy efficiency and security of the LEACH routing protocol when CH is selected. The energy efficiency improved by modifying the parameters of the cluster head selection algorithm for threshold function. And also, the security issue of the black hole attack detected and prevented based on the behaviors of the sensor node shown in the network when the sensor nodes request to participate in the CHs selection process at the setup phase in LEACH. Unlike LEACH routing protocol, the modified threshold function for CH selection algorithm of proposed routing protocol includes the parameters of residual energy of sensor node, the average residual energy of networks, and distance between the sensor node and base station (BS) to calculate the threshold value. The CH selection algorithm decides whether sensor nodes are selected as CHs or not in the network depending on the threshold value. This improvement extends the network lifetime and transmits reliable data in WSN. According to the simulation result, the proposed protocol reduces the energy usage of WSN and minimizes the probability of malicious nodes selected as cluster heads in the LEACH routing protocol.The proposed routing protocol improves the LEACH routing by an average of 34.67%, 28.43% 237.65% and 21.676% in terms of residual energy, network lifetime, packet sent to BS and throughput’s respectively. After implementing security solution on the proposed LEACH it improved by 1.88% in terms number of packet sent to BS under malicious attack. The proposed routing protocol for WSNs simulation was conducted with MATLAB on two scenarios.

Description

Keywords

Energy-efficient and Secure LEACH, Cluster Head Selection Algorithm, Black Hole Attacks in WSN, Black Hole Attack Detection, Threshold Function.

Citation