首页    期刊浏览 2024年12月01日 星期日
登录注册

文章基本信息

  • 标题:Simulation of Snooze Attack in Leach
  • 本地全文:下载
  • 作者:Meenakshi Tripathi ; M.S. Gaur ; V. Laxmi
  • 期刊名称:Computer Science & Information Technology
  • 电子版ISSN:2231-5403
  • 出版年度:2013
  • 卷号:3
  • 期号:5
  • 页码:393-399
  • DOI:10.5121/csit.2013.3541
  • 出版社:Academy & Industry Research Collaboration Center (AIRCC)
  • 摘要:Wireless Sensor Network (WSN) consists of large number of sensor nodes capable of forming instantaneous network with dynamic topology. Each node simultaneously as both router and host. Number of nodes in a WSN can vary either due to the mobility or death of nodes due to drained conditions. Low Energy Aware Cluster Hierarchy (LEACH ) is a most popular dynamic clustering protocol for WSN. Deployment in unattended environment, limited memory, limited power and low computational power of a sensor node make these networks susceptible to attacks launched by malicious nodes. This paper provides an overview of LEACH protocol and how LEACH can be compromised by malicious nodes. We propose a attack on LEACH – Snooze attack. This paper we present a way to simul ate this attack on NS-2 which is demonstrative on throughput. We observe that during simulation throughput drops as an effect of attack. It is observed that the effect of the attack gets aggregated as we increase the number of attackers
国家哲学社会科学文献中心版权所有