scispace - formally typeset
Journal ArticleDOI

Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks

TLDR
This paper discusses about the current state-of-the-art secure LEACH schemes that are proposed in literature, and categorizes them into cryptographic-based and trust-based solutions and reviews the major development in these two categories.
About
This article is published in Journal of Network and Computer Applications.The article was published on 2013-07-01. It has received 59 citations till now. The article focuses on the topics: Universal composability & Routing protocol.

read more

Citations
More filters
Journal ArticleDOI

Optimal LEACH protocol with modified bat algorithm for big data sensing systems in Internet of Things

TL;DR: Simulation results prove that the bat algorithm with weighted harmonic centroid (WHCBA) strategy is superior to other algorithms and can save more energy compared to the standard LEACH protocol.
Journal ArticleDOI

A survey and taxonomy of the fuzzy signature-based Intrusion Detection Systems

TL;DR: This paper presents a comprehensive investigation of the fuzzy misuse detection schemes designed using various machine learning and data mining techniques to deal with different kinds of intrusions.
Journal ArticleDOI

Secure and energy aware multi-hop routing protocol in WSN using Taylor-based hybrid optimization algorithm

TL;DR: The proposed Taylor C-SSA algorithm shows best performance in terms of energy, number of alive nodes, delay, and throughput values of 0.129, 42, 0.291, and 0.1, respectively.
Journal ArticleDOI

Variants of the Low-Energy Adaptive Clustering Hierarchy Protocol: Survey, Issues and Challenges

TL;DR: This paper is the first to emphasis on cluster formation and CHs selection methods and their strengths and weaknesses in WSNs, and a complete comparison of the location, energy, complexity, reliability, multi–hop path, and load balancing characteristics of LEACH variants is conducted.
Journal ArticleDOI

Key management in wireless Body Area Network

TL;DR: This paper mainly classifies the key management methods into the biometric and non-biometric categories and illustrates their main capabilities in detail and provides a complete comparison of the security schemes and highlights their features and limitations.
References
More filters
Proceedings ArticleDOI

Energy-efficient communication protocol for wireless microsensor networks

TL;DR: The Low-Energy Adaptive Clustering Hierarchy (LEACH) as mentioned in this paper is a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network.

Energy-efficient communication protocols for wireless microsensor networks

TL;DR: LEACH (Low-Energy Adaptive Clustering Hierarchy), a clustering-based protocol that utilizes randomized rotation of local cluster based station (cluster-heads) to evenly distribute the energy load among the sensors in the network, is proposed.
Journal ArticleDOI

A survey on clustering algorithms for wireless sensor networks

TL;DR: A taxonomy and general classification of published clustering schemes for WSNs is presented, highlighting their objectives, features, complexity, etc and comparing of these clustering algorithms based on metrics such as convergence rate, cluster stability, cluster overlapping, location-awareness and support for node mobility.
Proceedings Article

The Beta Reputation System

TL;DR: A new reputation system based on using beta probability density functions to combine feedback and derive reputation ratings is described which is flexibility and simplicity as well as its foundation on the theory of statistics.
Proceedings ArticleDOI

LEAP: efficient security mechanisms for large-scale distributed sensor networks

TL;DR: The Localized Encryption and Authentication Protocol (LEAP) as discussed by the authors is a key management protocol for sensor networks that is designed to support in-network processing, while at the same time restricting the security impact of a node compromise to the immediate network neighborhood of the compromised node.
Related Papers (5)