0% found this document useful (0 votes)
32 views9 pages

Extend Wireless Sensor Networks Lifetime Which Use Cluster-Based Routing Protocol, Namely Leach

Wireless Sensor Network (WSN) is a spatially distributed sensors that can monitor environmental and exchange that information with each other over wireless medium. Due to their energy restrictions, their limited storage capability, and positioning in hostile environments, WSNs are vulnerable to various routing attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views9 pages

Extend Wireless Sensor Networks Lifetime Which Use Cluster-Based Routing Protocol, Namely Leach

Wireless Sensor Network (WSN) is a spatially distributed sensors that can monitor environmental and exchange that information with each other over wireless medium. Due to their energy restrictions, their limited storage capability, and positioning in hostile environments, WSNs are vulnerable to various routing attacks.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Volume 9, Issue 11, November– 2024 International Journal of Innovative Science and Research Technology

ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24NOV111

Extend Wireless Sensor Networks


Lifetime which use Cluster-Based
Routing Protocol, Namely Leach
Case Study: Integrated Polyclinic Regional College-Huye Campus
(Area of Focus: Wireless Sensor Network)

DUSINGIZE Gilbert1; Dr. Wilson MUSONI(PhD)2


Masters of Science with honors in Information Technology, at University of Kigali, Rwanda

Abstract:- Wireless Sensor Network (WSN) is a spatially I. INTRODUCTION


distributed sensors that can monitor environmental and
exchange that information with each other over wireless Wireless Sensor Networks (WSNs) have been a focal
medium. Due to their energy restrictions, their limited point of research and development for several decades,
storage capability, and positioning in hostile driven by the need for cost-effective and efficient solutions
environments, WSNs are vulnerable to various routing for monitoring and controlling physical environments
attacks. Sinkhole attack is the main issue in the said remotely. Wireless Sensor Network (WSN) consists of large
wireless sensor network which permanently disable number of low-cost, resource-constrained sensor nodes with
sensor node by draining nodes battery power and drop the ability to sense information from the surrounding and
all packets and prevent it to reach the base station. send to the base station(BS.
Cluster-based routing protocols are developed to
undertake this problem, and the Low Energy Adaptive
Clustering Hierarchy (LEACH) is one of the best-known
protocols of this type. It is very important to secure the
communication between nodes and prevent against
different attacks especially in cluster based WSN that
run LEACH routing protocol.

Therefore, this paper proposes an algorithm for


extending the lifetime of Wireless Sensor Network which
uses a clustering-based routing protocol namely LEACH
for its routing operation in IPRC-Huye Campus. The
proposed algorithm indicates the random election of
normal nodes and then flags the dead nodes at each
epoch and then increment accordingly. The cluster Fig 1 WSN Distribution
head(CH) election is done by calculating the ratio of
optimal election probability and the modulation of
rounds. The dissipated energy is now obtained based on
the energy data aggregation and the distance between
nodes.

Above all, the simulation result is shown for the


proposed algorithm which is proven to be efficient
compared with the existing one, namely, LEACH, in
terms of minimum computational complexity and high
energy efficiency. Moreover, the algorithm was
numerically analyzed using MATLAB.

Fig 2 Clustering Wireless Sensor Network

IJISRT24NOV111 www.ijisrt.com 409


Volume 9, Issue 11, November– 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24NOV111

The development of an extended the WSN ‘s lifetime the campus, greenhouse management and other workshops
that uses LEACH protocol is a complicated and intriguing that uses different sensor to provide different real-time data
task. It involves a trench apprehension of the needs of IPRC for the campus Nsabiyumva willy ,2015).
Huye Campus WSN, the impact of quick energy drainage on
the lifetime of the network due to various threats such as III. RESEARCH GAPS
sinkhole reduce gradually the performance of the network,
and the complexity of the algorithm needed to solve the The LEACH (Low-Energy Adaptive Clustering
problem. In this study a comparative study technique was Hierarchy) protocol is a well-known protocol for wireless
followed to analyze the connection between the forecasted sensor networks (WSNs) that uses clustering to improve
variable and criterion variable(dependent variable).Many energy efficiency. However, as research on LEACH has
were found from each single in the sample ,one mark for evolved, various gaps and challenges have emerged,
every variable .This study approach were appropriate and suggesting areas for further research.
matching to our study since the researcher had to gather
based on current situation of WSN of the campus to  Energy Efficiency in Large-Scale Networks:
increase lifetime. LEACH struggles with energy efficiency and
scalability when applied to large-scale networks with many
II. BACKGROUND OF STUDY nodes. In LEACH, cluster heads are chosen randomly
without considering node residual energy or proximity to
The research background of WSNs can be traced back other cluster heads, which can lead to unbalanced energy
to the late 1990s and early 2000s when the proliferation of consumption.
microsensor technology and advancements in wireless
communication paved the way for their exploration and  Security Vulnerabilities:
development Hossam Mahmoud Ahmad Fahmy LEACH was not designed with security as a primary
(2016).Early research in WSNs primarily focused on concern, making it susceptible to attacks like eavesdropping,
fundamental issues such as energy efficiency, routing replay attacks, and node compromise, which can
protocols, and data aggregation techniques. Energy compromise data integrity and network resilience.
efficiency was a critical concern due to the limited power
resources of sensor nodes, which are often powered by  Mobility Support:
batteries or energy harvesting mechanisms. Researchers LEACH assumes static sensor nodes and does not
explored techniques to minimize energy consumption at support mobile nodes, which limits its applications in
different layers of the network protocol stack, including the scenarios like vehicular ad hoc networks or animal tracking.
physical, MAC, routing, and application layers Waltenegus
Dargie(2010).Routing protocols played a crucial role in  Load Balancing and Cluster Head Longevity:
WSNs to enable efficient data delivery from sensor nodes to The random selection of cluster heads can lead to
sink nodes or base stations. uneven load distribution, causing some nodes to deplete
their energy faster than others. This imbalance can reduce
Traditional routing protocols such as LEACH (Low- network lifetime and reliability.
Energy Adaptive Clustering Hierarchy) and SPIN (Sensor
Protocols for Information via Negotiation) were developed  Energy Overhead in Cluster Formation:
to address the unique characteristics and constraints of The frequent re-clustering in LEACH introduces
WSNs, such as node mobility, network topology changes, significant energy overhead due to control message
and energy conservation by Holger Karl (2007). Today, exchange, which can be counterproductive for network
WSN research continues to evolve with a focus on lifetime.
addressing emerging challenges such as security and privacy
concerns, scalability issues, interoperability among IV. METODOLOGY
heterogeneous sensor nodes, integration with emerging
technologies like Internet of Things (IoT) and edge  Methods of collecting data: Tools/Instruments
computing, and the development of self-organizing, self- Data collection is the process of gathering and
healing WSN architectures capable of adapting to dynamic measuring information on variables of interest in a
environmental conditions Abdulrahman Yarali, systematic way, allowing you to answer research questions,
PhD(2020).However, the decentralized nature and limited test hypotheses, and evaluate outcomes. In general, data
security features in WSNs make them vulnerable to a variety collection aims to ensure the information is accurate,
of attacks, including sinkhole attacks. A sinkhole attack is a reliable, and relevant to the subject of study. In this study,
type of network-layer attack in which a malicious node, or a the researcher used a questionnaire as research instrument
"sinkhole," attempts to attract network traffic by falsely and analyze the secondary data. Approaching people with a
advertising itself as an optimal route to the base station. This questionnaire is the best way to collect both qualitative and
attack is particularly harmful because, once the malicious quantitative data from respondents.
node successfully attracts traffic, it can disrupt the network
by Dropping packets, Altering or delaying packets , Energy  Data Analysis
drain and so on. IPRC-Huye has introduced this technology Data analysis is the process of examining, cleaning,
in different domain such as in detecting water tanks level in transforming, and interpreting data to extract meaningful

IJISRT24NOV111 www.ijisrt.com 410


Volume 9, Issue 11, November– 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24NOV111

insights, answer research questions, or support decision- interpreted and used for decision-making. Data processing
making. It’s a crucial step in turning raw data into actionable was mainly done though MATLAB as a simulation tool.
information. Data analysis is expected to offer clarity on the
topic of the study and the respondants’perceptions, as well  MATLAB
as increase readers understanding of the topic and temper All the network topologies were simulated with
their interest in this portion of the research. SPSS were used MATLAB. Moreover, it was backdoored to facilitate
to analyses data and present the results using data analysis changes in network with the pre-available protocols.
tools used in scientific analysis (Burns ,2022). MATLAB is short for MATrix LABoratory and it revolves
around vectors and matrices. MATLAB additionally
 Data Processing addresses algebraic and differential equations, which are
Data processing is the act of converting raw data into a quite relevant in linear algebra.
usable form through a series of systematic operations. The
goal is to transform data into information that can be easily
conduced in Integrated Polyclinic Regional College-Huye
It is a powerful tool for creating 2D and 3D Campus as case study because it was the best place which
imagesMATLAB offers visually appealing graphic has enough and appropriate infrastructure.
capabilities. This is, in my opinion one of the easiest
languages to write mathematical programsAt last, it is  Ethical Considerations
programming language as well. Others include signal The ethical consideration will be useful to safeguard
processing, image in addition to optimization that can be the data collected within this research. Research ethics are
download from the MATLAB via its tool boxes (Chidiebere, likely a limited set of requirements imposed on researchers
2017). to be truthful and respectful with all people their study
affected by or the results report. Stricter ethical codes are
 Research Design codified with Researcher typically. It will respect the values
Research design is the structured plan for conducting a of people researching with. Except that data was only
research study. It outlines the methods and procedures for helping me to do the academic work and aid my
collecting, analyzing, and interpreting data, ensuring that the contribution in quality of education. Personal data were
study effectively addresses the research question or guaranteed confidential and none of the respondents was
hypothesis. A well-defined research design maximizes the accused based on his/her statement.
validity and reliability of the results, making the findings
more credible and actionable. The experiments of this  Conceptual Framework
research were accomplished based on the algorithm. Conceptual framework (or theoretical framework) is a
structure which can hold or support many things to interpret
The output from experiments were compared with and explain them. It is a theoretical base that enables
control samples. Sample input data were used to test change researchers, scholars or professionals to conceptualize and
in the outputs. The correlated research was to variables of organize their research so one can present it within the
new result at the end. Hence, we do not have continuous specific field or discipline.
data, random data sample were assumed. The study was

Fig 3 Conceptual Framework

IJISRT24NOV111 www.ijisrt.com 411


Volume 9, Issue 11, November– 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24NOV111

 Improved LEACH Model


This diagram indicate the data flow of an extended algorithm for dissipation of energy in wireless sensor networks. It have
many of steps as shown in the figure 4.

Fig 4 Data Flow Diagram.

 Random Nodes Distribution nodes and dead nodes are distributed randomly and the
During the creation of the field dimension, it is algorithm will form the clusters, elect cluster heads.
composed by of 30 nodes as shown in figure (5). The normal

IJISRT24NOV111 www.ijisrt.com 412


Volume 9, Issue 11, November– 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24NOV111

Fig 5 Random Nodes Distribution

 Cluster Formation
Clustering involves managing a limited number of energy consumption is relatively minimal. The use of
logical groups composed of physical network nodes while clustering facilitates the rapid identification of routes since
the network operates. Clusters represent the logical groups. only the cluster heads communicate with the base station.
During the initial formation of the cluster, it can identify The diagram below depicts how communication occurs
compromised nodes and remove them. The primary defense within the cluster. It involves single-hop communication
for secure clustering is the elimination of at-risk nodes from node to cluster. The structure of the wireless sensor
during the cluster setup. The clustering process aims to network consists of 30 sensor nodes that are connected to a
minimize energy consumption for all sensors. Clusters are single base station. These sensors are organized into three
established based on the physical proximity of the distinct clusters. This network design enables the sensors to
nodes.Data transmission from a cluster to a base station is use less energy while sending data within the network.
carried out by a Cluster Head (CH). In this configuration,

Fig 6 Cluster Formation

IJISRT24NOV111 www.ijisrt.com 413


Volume 9, Issue 11, November– 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24NOV111

n<t(n), the node becomes a Cluster Head. In every round,


the chosen CHs disseminate an advert message to all nodes
in network of their new status. Based on the message
received, every non-cluster head node can find out to which
cluster it belongs to according to the received signal
strength. Each node in cluster is allocated a fixed time slot
by using time division multiple access protocol (TDMA).
 Extended Algorithm
The proposed new adaptive algorithm is based on  Calculation of Energy Dissipation
operating in rounds with three phases each:(1)sensor nodes Since the main source of energy dissipation rely on
clustering (2.)Cluster head election and (3)Calculation of CHs and Base Station communication, the importance of
energy dissipation. LEACH is to rotate CHs in order to avoid the quick drainage
of energy for CHs.This approach increase the network
 Sensor Nodes Clustering lifetime. The energy dissipation is calculated in this way:
In this phase, nodes are distributed randomly and Total_Energy(i)=S(i). E; temp_rand= (p/ (p*mod (r,
organized themselves into clusters based on initial energy of round(1/p)))) *S(i). E/Total_Energy. Where temp_rand is the
each node as indicates in figure (5). temporary round; p is the optimal election probability of
node to become cluster; mod is S(i) is the nodes; E is the
 Cluster Heads Election energy.
In this phase, every node chooses a random number
between 0 and 1 and compares it to doorway t(n) and if

IJISRT24NOV111 www.ijisrt.com 414


Volume 9, Issue 11, November– 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24NOV111

 Algorithm2.Sinkhole attack and energy lifetime extension for transmission and reception ETX=ERX=50*0.000
This algorithm focuses on energy efficiency for 000 001.
increasing network lifetime that run on LEACH protocol in
cluster based WSN. It is starting by the initial parameters, The step number one was to set the location in random
energy of normal nodes E0=0.5J, environment size 100m x way, then choose the strongest node as acting as CH after
100m, number of node 100, maximum number of round that will choose active CHs and put the remain particular
RMAX=4000, data aggregation energy. node in dead mode. For every round, will compute the node
energy dissipated by detecting 1st energy dissipated in its
EDA=5*0.000 000 001; active cluster head and sleep round then edit all nodes of energy, all former procedures
cluster head are elected randomly, optimal election will iterate the most of CHs are died.
probability of node to become cluster p=10%, energy model

Fig 7 Energy Dissipation by Rounds Comparison

The simulation results as shown on graph1 indicates RECOMMENDATION


the energy dissipated per round on ordinary LEACH is too
quick in 4000rounds.The graph2 indicates that the energy  IPRC-Huye Campus.
dissipation improved LEACH is lasting dramatically. The The developed algorithm extends the network's
simulation indicates that the energy dissipation has lifespan. I suggest that IPRC-Huye Campus adopt this
increased almost about 300% which a good results for algorithm for their wireless sensor network to impove its
algorithm efficiency. This gives a good performance as the performance.
network lifetime longer than before.
 Future Researches
V. CONCLUSION This research was carried out solely at the IPRC-Huye
campus. Future researchers should explore the other
In summary, the main objective of this project was to campuses in Rwanda as well as other institutions that
raise the lifetime of WSN using cluster-based routing implement wireless sensor networks. They may focus on
protocol namely LEACH. As discussed in the previous improving security protocols and look into expanding the
chapter, we developed an algorithm that effectively extends algorithms related to machine learning and artificial
the lifetime of the WSN on the campus. Ultimately, we intelligence.
found that existing algorithms are not effective and their
energy efficiency is significantly lacking. Furthermore, we
conclude that the proposed algorithm successfully increases
the lifetime of the campus's wireless sensor network.

IJISRT24NOV111 www.ijisrt.com 415


Volume 9, Issue 11, November– 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24NOV111

REFFERENCES [13]. X. Deng, R. Wu, W. Wang, and R. Bu, “An intrusion


detection system for cluster based wireless sensor
[1]. Abdullah, M. Y., et al.(2009). Energy scheduling with networks,” Information Technology Journal, vol. 12,
roles dormant cells in wireless sensor network. In no. 9, pp. 1764–1771, 2013.
Mechatronics and Automation, International [14]. H. Shafiei, A. Khonsari, H. Derakhshi, and P.
Conference on IEEE, 541-545. Mousavi, “Detec tion and mitigation of sinkhole
[2]. Bakaraniya, P., & Mehta, S.(2013) K-LEACH: An attacks in wireless sensor networks,” Journal of
improved LEACH Protocol for Lifetime Computer and System Sciences, vol. 80, no. 3, pp.
Improvement in WSN. International Journal of 644–653, 2014.
Engineering Trends and Technology,4(5), 1521- [15]. V. K. Jatav, M. Tripathi, M. S. Gaur, and V. Laxmi,
1526. “Wireless sensor networks: attack models and
[3]. Chugh, C., & Singh, R. A.(2013). Real-Time detection,” in Proceedings of IACSIT Hong Kong
MATLAB based GUI for node placement and a Conferences, vol. 30, pp. 144–150, 2012.
shortest-path alternate route path algorithm in [16]. M. Bahekmat, M. H. Yaghmaee, A. S. H. Yazdi, and
Wireless Sensor Networks. International Journal for S. Sadeghi, “A novel algorithm for detecting sinkhole
Science and Emerging,7(1),11-16. attacks in WSNs,” International Journal of Computer
[4]. C. Karlof and D. Wagner, “Secure routing in wireless Theory and Engineering, vol. 4, no. 3, pp. 418–421,
sensor networks: attacks and countermeasures,” Ad 2012.
Hoc Networks, vol. 1, no. 2-3, pp. 293–315, 2003. [17]. F. Ye, G. Zhong, J. Cheng, S. Lu, and L. Zhang,
[5]. G. Padmavathi and D. Shanmugapriya, “A survey of “PEAS: a robust energy conserving protocol for
attacks, security mechanisms and challenges in long-lived sensor networks,” in Proceedings of the
wireless sensor net works,” International Journal of 23th IEEE International Conference on Distributed
Computer Science and Informa tion Security, vol. 4, Computing Systems (ICDCS ’03), pp. 28–37, May
no. 1-2, 2009. 2003.
[6]. N. A. Alrajeh, S. Khan, and B. Shams, “Intrusion [18]. W. Ye, J. Heidemann, and D. Estrin, “An energy-
detection systems in wireless sensor networks: a efficient MAC protocol for wireless sensor
review,” International Journal of Distributed Sensor networks,” in Proceedings of the IEEE Computer and
Networks, vol. 2013, Article ID 167575, 7 pages, Communications Societies (INFOCOM ’02), pp.
2013. 1567–1576, New York, NY, USA, June 2002.
[7]. J. A. Chaudhry, U. Tariq, M. A. Amin, and R. G. [19]. T. Van Dam and K. Langendoen, “An adaptive
Rittenhouse, “Dealing with sinkhole attacks in energy-efficient MAC protocol for wireless sensor
wireless sensor networks,” Advanced Science and networks,” in Proceedings of the 1st International
Technology Letters, vol. 29, pp. 7–12, 2013. Conference on Embedded Networked Sensor
[8]. M. Dener, “Security analysis in wireless sensor Systems (SenSys ’03), pp. 171–180, Los Angeles,
networks,” International Journal of Distributed Calif, USA, November 2003.
Sensor Networks, vol. 2014, Article ID 303501, 9 [20]. G. Lu, B. Krishnamachari, and C. S. Raghavendra,
pages, 2014. “An adaptive energy-efficient and low-latency MAC
[9]. S. A. Salehi, M. A. Razzaque, P. Naraei, and A. for data gathering in wireless sensor networks,” in
Farrokhtala, “Detection of sinkhole attack in wireless Proceedings of 18th International Parallel and
sensor networks,” in Proceedings of the 3rd IEEE Distributed Processing Symposium (IPDPS ’04), pp.
International Conference on Space Science and 3091–3098, April 2004.
Communication (IconSpace ’13), pp. 361–365, [21]. T. Zheng, S. Radhakrishnan, and V. Sarangan,
Melaka, Malaysia, July 2013. “PMAC: an adaptive energy-efficient MAC protocol
[10]. P. Maidamwar and N. Chavhan, “Impact of for wireless sensor networks,” in Proceedings of the
wormhole attack on performance of LEACH in 19th IEEE International Parallel and Distributed
wireless sensor networks,” Inter national Journal of Processing Symposium (IPDPS ’05), p. 237, April
Computer Networking, Wireless and Mobile 2005.
Communications, vol. 3, no. 3, pp. 21–32, 2013. [22]. J. Polastre, J. Hill, and D. Culler, “Versatile low
[11]. I. Krontiris, T. Dimitriou, T. Giannetsos, and M. power media access for wireless sensor networks,” in
Mpasoukos, “Intrusion detection of sinkhole attacks Proceedings of the 2nd International Conference on
in wireless sensor network,” in Proceedings of the Embedded Networked Sensor Systems (SenSys ’04),
3rd International Workshop on Algorithmic Aspects pp. 95–107, November 2004.
of Wireless Sensor Networks (AlgoSensors ’07), vol. [23]. M. Buettner, G. V. Yee, E. Anderson, and R. Han, “X-
4837, pp. 150–161, Wrocław, Poland, 2007. MAC: a short preamble MAC protocol for duty-
[12]. S. Iqbal, S. P. Aravind Srinivas, G. Sudharsan, and S. cycled wireless sensor networks,” in Proceedings of
S. Kashyap, “Comparison of different attacks on the 4th International Conference on Embedded
LEACH protocol inWSN,” International Journal of Networked Sensor Systems (SenSys’ 06), pp. 307–
Electrical, Electronics and Data Communication, vol. 320, November 2006.
8, no. 8, pp. 16–19, 2014.

IJISRT24NOV111 www.ijisrt.com 416


Volume 9, Issue 11, November– 2024 International Journal of Innovative Science and Research Technology
ISSN No:-2456-2165 https://doi.org/10.38124/ijisrt/IJISRT24NOV111

[24]. A. El-Hoiydi and J. D. Decotignie, “WiseMAC: an


ultra low power MAC protocol for multi-hop
wireless sensor networks,” in Proceedings of the 1st
International Workshop on Algorithm Aspects of
Wireless Sensor Networks, vol. 3121 of Lecture
Notes in Computer Science, pp. 18–31, 2004.
[25]. E. Shih, S. H. Cho, N. Ickes et al., “Physical layer
driven proto col and algorithm design for energy-
efficient wireless sensor networks,” in Proceedings of
the 7th Annual International Conference on Mobile
Computing and Networking (MOBICOM ’01), pp.
272–286, July 2001.
[26]. S. Kumar, T. H. Lai, and J. Balogh, “On k-coverage
in a mostly sleeping sensor network,” in Proceedings
of the 10th Annual International Conference on
Mobile Computing and Networking (MOBICOM
’04), pp. 144–158, October 2004.
[27]. P. Berman, G. Calinescu, C. Shah, and A. Zelikovsky,
“Power efficient monitoring management in sensor
networks,” in Pro ceedings of the IEEE Wireless
Communications and Networking Conference
(WCNC ’04), pp. 2329–2334, 2004.
[28]. W. R. Heinzelman, A. Chandrakasan, and H.
Balakrish nan, “Energy-efficient communication
protocol for wireless microsensor networks,” in
Proceedings of the 33rd Annual Hawaii International
Conference on System Siences (HICSS ’00), p. 223,
January 2000.
[29]. A. Sinha and A. Chandrakasan, “Dynamic power
management in wireless sensor networks,” IEEE
Desig
[30]. S. Athmani, D. E. Boubiche, and A. Bilami,
“Hierarchical energy efficient intrusion detection
system for black hole attacks in WSNs,” in
Proceedings of the World Congress on Computer and
Information Technology, pp. 1–5, June 2013.
[31]. M. Tripathi, M. S. Gaur, and V. Laxmi, “Comparing
the impact of black hole and gray hole attack on
LEACH in WSN,” in Proceedings of 4th
International Conference on Ambient Systems,
Networks and Technologies (ANT ’13), vol. 19, pp.
1101–1107, June 2013.

IJISRT24NOV111 www.ijisrt.com 417

You might also like