SlideShare a Scribd company logo
1 of 4
Download to read offline
Aravind Srinivas S P et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.75-78
www.ijera.com 75 | P a g e
Effect of Blackhole Attack on Single Hop and Multihop Leach
Protocol
Siddiq Iqbal, Aravind Srinivas S P, Sudarshan G, Sagar S Kashyap
IEEE student member Assistant professor, Dept. of Telecommunication, B.M.S. Institute of Technology,
Bangalore
Dept. of Telecommunication B.M.S. Institute of Technology, Bangalore
Dept. of Telecommunication B.M.S. Institute of Technology, Bangalore
Dept. of Telecommunication B.M.S. Institute of Technology, Bangalore
Abstract
Wireless micro sensor networks provide reliable monitoring of remote areas for data-gathering. Due to the
limited battery capacity of sensor nodes, energy consumption plays an important role in the operation of WSN.
This can be improved by using a protocol called Low energy adaptive clustering hierarchy (LEACH).Malicious
attacks are generated in the network due to power supply, processing abilities and capacity for high power radio
transmission. In this paper one such attack namely BlackHole attack and its effect on single hop LEACH and
multihop LEACH has been compared, simulated and analyzed.
Index terms-WSN, LEACH, Blackhole, Multi hop, Residual Energy.
I. INTRODUCTION
Wireless sensor networks consists of
spatially distributed autonomous devices using
sensors to cooperatively monitor physical or
environmental conditions such as temperature, sound,
vibration, pressure, motion or pollutants at different
locations. It combines sensing computation and
communication into a single tiny device [7].
LEACH is an application specific
hierarchical protocol formed to reduce power
consumption which involves data aggregation or
fusion and subsequent transmission to base station[3].
All non-cluster-head nodes must transmit their data to
the cluster-head, while the cluster- head node must
receive data from all the cluster members, perform
signal processing functions on the data (e.g., data
aggregation), and transmit data to the remote base
station.
II. LEACH PROTOCOL
LEACH has two phases 1) Setup phase
2) Steady phase
Figure 1: Flowchart of LEACH
Set-Up Phase: Cluster is constructed by Cluster Head
election. Each node decides independent of other
nodes if it will become a Cluster Head or not[6]. This
decision takes into account when the node served as a
Cluster Head for the last time. Its main functions are
 organizing the network into clusters
 Advertisements of the cluster heads
 Transmission schedule creation
RESEARCH ARTICLE OPEN ACCESS
Aravind Srinivas S P et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.75-78
www.ijera.com 76 | P a g e
Steady phase: Steady phase is further divided into 2
parts:
 Schedule Creation
 Data Transmission
In the steady working stage, each member
node of the cluster send data to the corresponding
cluster head during the allotted communication slot.
After receiving all the data, the cluster head
aggregate it and sends to the sink. In order to
minimize the power consumption, the steady phase
duration is kept far greater than the cluster
constructing phase duration.
Due to dynamic topology, limited resources
and open nature of wireless medium it makes it easier
for the outsiders to attack and interfere with the
network[5]. Hence LEACH protocol is prone to
several attacks. One of such attack is blackhole
attack.
III.BLACKHOLE ATTACK ON MULTI-
HOP LEACH PROTOCOL
A. Multi hop LEACH
When the network diameter is increased, the
distance between the base station and the cluster head
increases. Hence the leach routing protocol is not
helpful. Thus, in order to increase the energy
efficiency multi-hop communication within the
cluster is done. The communication between the
cluster head and the sink is done via multiple hops by
choosing an optimal path
Figure 2: Multi hop LEACH
B. Multihop Algorithm
In the multihop LEACH network, each node
does 2 types of transmission [2]. One is to send the
data collected by it to its local cluster head. The other
is to forward the data to other nodes as part of the
multihop transmission if it is part of the routing path
of any other node. The multihop routing path used
here is a static route calculated based on the least
distance factor. The routing path for any node can be
determined by using the following algorithm:
Step 1: the node whose route needs to be determined
is considered to be the source node.
Step 2: The nodes which fall in the transmission
range of this source node are shortlisted.
Step 3: Among these nodes, the node which has the
shortest distance from the base station is considered
as the next hop of the source node.
Step 4: This next hop node is then considered as the
source node and steps 2 and 3 are repeated to find
out the subsequent next-hops.
Step 5: The above step is repeated until the base
station node is part of the shortlisted nodes i.e. it falls
in the transmission range of a next-hop node.
Step 6: All the next-hop nodes are stored in an array
for later use.
C. Blackhole attack:
This is a type of DOS attack where the
attacker collects the data and then later drops it. Since
attacker is having higher initial energy than the other
nodes it becomes one of the cluster heads in the first
round and even in later rounds, as it is not consuming
any energy for data transmission [1].Hence it
becomes cluster head in almost all the rounds. After
becoming cluster head it receives data from all of its
cluster members, aggregate it and later does not
forward the data to the base station [4].
Figure 3: blackhole attack
IV.SIMULATION
The simulation results shown were
generated using MATLAB software. The parameter
settings are as shown in table 1.
To simulate the Blackhole attack, the
parameters shown in table 1 are considered. Here, 5
of the 100 nodes are assumed to be compromised.
These nodes do not transmit the data that they receive
and hence affects the throughput of the network.
Aravind Srinivas S P et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.75-78
www.ijera.com 77 | P a g e
Table 1: Simulation parameters
Parameter Value
Network area 200m X 200m
Number of rounds 2500
Number of nodes 100
Packet size 4000
Initial energy 0.5 J
Data aggregation energy 5 X 10^-9 J
Transmission/reception
energy
50 X 10^-9 J
Amplification energy 0.0013 X 10^-12
J
Energy of free space signal 10 X 10^-12 J
Sink position (100m,100m)
Figure4: Graph of data transmitted in single hop and
multi hop LEACH during the event of Blackhole
attack.
As seen from the figure 4 above the data
transmitted during the single hop LEACH without
attack is maximum. In multihop LEACH without
attack the data transmitted is significantly less due to
the higher energy consumption during multiple hops
from the cluster head to the base station. In the event
of a Blackhole attack, the effect of the attack on
multi-hop LEACH is maximum resulting in least data
being transmitted to the base station. In case of
Blackhole attack on single hop LEACH the data
transmitted is lesser than the basic LEACH but still
higher than multi-hop LEACH without attack. In the
operation of LEACH the data before being
transmitted to the base station is aggregated at the
cluster head and then transmitted as a single packet.
Due to this the difference in data transmitted in all
the above cases in the figure is minute.
Figure 5: Graph of alive nodes in single hop and
multi hop LEACH in the event of Blackhole attack.
In case of Blackhole attack the energy
consumption is less since the packets are not
transmitted to the base station. This, results in the
nodes staying alive for a longer duration. From the
figure 5 it is evident that the single hop LEACH with
the attack has nodes which are alive for a longer
duration than the single hop LEACH without attack.
In case of multi-hop LEACH with attack the nodes
stay alive for a longer duration than multi-hop
LEACH without attack but lesser than the single hop
without attack. This is because the energy
consumption during multiple hops in the network is
more. In single hop LEACH the compromised node
affects itself and its cluster members. In multi hop
LEACH since the compromised node can be a part of
the multi hop path it can affect other clusters as well.
Hence energy consumption is more in multi hop
LEACH
Figure 6: Graph of residual energy in single hop and
multi hop LEACH during the event of Blackhole
attack.
Aravind Srinivas S P et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.75-78
www.ijera.com 78 | P a g e
It is evident from the figure 6 that the
residual energy of the single hop LEACH with attack
is maximum since the energy consumption is less and
the packets are not transmitted to the base station.
The multi-hop LEACH with Blackhole attack has
more residual energy than the LEACH protocols
without attack and lesser than single hop LEACH
with attack due to multiple hops. The residual energy
of the LEACH protocols without attack is similar.
V. CONCLUSION
The goal of the blackhole attack is to collect
as much data possible by the malicious nodes and
later drop them. In this paper we are providing
simulation results for data transmitted, number of
alive nodes and residual energy by comparing single
hop LEACH, multi hop LEACH and the effect of
Blackhole attack on them. The data transmitted is
least in the multi hop LEACH network affected by
Blackhole attack and maximum in the network of
single hop LEACH without attack. The nodes are
alive for a longest duration in single hop LEACH
with attack. The residual energy is highest in the
single hop LEACH with attack. Hence, the impact of
Blackhole attack is more on multi hop LEACH
network than a single hop LEACH network.
REFERENCES
[1] Hierarchical Energy Efficient Intrusion
Detection System for Black Hole Attacks in
WSNs Samir Athmani, Djallel Eddine
Boubiche and Azeddine Bilami, 978-1-
4799-0462-4/13/$31.00 ©2013 IEEE.
[2] Improvement on LEACH Protocol of
Wireless Sensor Network, Fan Xiangning,
Song Yulin, 0-7695-2988-7/07 $25.00 ©
2007 IEEE.
[3] Performance Evaluation of LEACH Protocol
in Wireless Network, M. Shankar, Dr .M.
Sridar, Dr. M. Rajani, International Journal
of Scientific & Engineering Research,
Volume 3, Issue 1, January-2012 1 ISSN
2229-5518.
[4] Comparing the Impact of Black Hole and
Gray Hole Attack on LEACH in WSN by
Meenakshi Tripathi,M.S.Gaur,V.Laxmi
Malaviya National Institute of Technology,
Jaipur, India 2013 published by Elsevier
B.V.
[5] Leach and Its Descendant Protocols: A
Survey J. Gnanambigai, Dr. N. Rengarajan,
K. Anbukkarasi International Journal of
Communication and Computer
Technologies Volume 01 – No.3, Issue: 02
September 2012 ISSN NUMBER: 2278-
9723.
[6] An Energy Balanced Clustering Algorithm
Based on LEACH Protocol Qian Liao, Hao
Zhu 2nd International Conference 2012 on
Systems Engineering and Modeling
[7] A Review of Routing Protocols in Wireless
Sensor Networks Prabhat Kumar, M.P.
Singh and U. S. Triar National Institute of
Technology Patna, Bihar, India International
Journal of Engineering Research &
Technology (IJERT) Vol. 1 Issue 4, June -
2012 ISSN: 2278-0181

More Related Content

What's hot

Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing ProtocolSantosh Regmi
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Aayush Gupta
 
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Network
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor NetworkEnergy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Network
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Networkijsrd.com
 
Hierarchical clustering algo for wsn
Hierarchical clustering algo for wsnHierarchical clustering algo for wsn
Hierarchical clustering algo for wsnSamruddhi Gaikwad
 
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor NodeIRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor NodeIRJET Journal
 
Compare and Analyses of Optimized R-Leach With Leach Algorithm In WSN
Compare and Analyses of Optimized R-Leach With Leach Algorithm In WSN Compare and Analyses of Optimized R-Leach With Leach Algorithm In WSN
Compare and Analyses of Optimized R-Leach With Leach Algorithm In WSN ijsc
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A ReviewEditor IJMTER
 
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...IRJET Journal
 
LEACH Cluster-based Routing Protocol for Wireless Sensor Networks
LEACH Cluster-based Routing Protocol for Wireless Sensor Networks LEACH Cluster-based Routing Protocol for Wireless Sensor Networks
LEACH Cluster-based Routing Protocol for Wireless Sensor Networks Urvashi Khandelwal
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution vivek pratap singh
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Journals
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkeSAT Publishing House
 
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...IJCSIT Journal
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECYogesh Fulara
 

What's hot (20)

Clouster Based Routing Protocol
Clouster Based Routing ProtocolClouster Based Routing Protocol
Clouster Based Routing Protocol
 
Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...Performance evaluation of variants of particle swarm optimization algorithms ...
Performance evaluation of variants of particle swarm optimization algorithms ...
 
Leach
Leach Leach
Leach
 
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Network
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor NetworkEnergy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Network
Energy Curtailing with Huddling Practices with Fuzzy in Wireless Sensor Network
 
Hierarchical clustering algo for wsn
Hierarchical clustering algo for wsnHierarchical clustering algo for wsn
Hierarchical clustering algo for wsn
 
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor NodeIRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
IRJET- Enhancing Data Transmission and Protection in Wireless Sensor Node
 
Compare and Analyses of Optimized R-Leach With Leach Algorithm In WSN
Compare and Analyses of Optimized R-Leach With Leach Algorithm In WSN Compare and Analyses of Optimized R-Leach With Leach Algorithm In WSN
Compare and Analyses of Optimized R-Leach With Leach Algorithm In WSN
 
Study of Leach Protocol- A Review
Study of Leach Protocol- A ReviewStudy of Leach Protocol- A Review
Study of Leach Protocol- A Review
 
E017422935
E017422935E017422935
E017422935
 
LEATCH:
LEATCH: LEATCH:
LEATCH:
 
Leach
LeachLeach
Leach
 
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...
Comparative Performance Analysis of Teen Sep Leach EAMMH and PEGASIS Routing ...
 
LEACH Cluster-based Routing Protocol for Wireless Sensor Networks
LEACH Cluster-based Routing Protocol for Wireless Sensor Networks LEACH Cluster-based Routing Protocol for Wireless Sensor Networks
LEACH Cluster-based Routing Protocol for Wireless Sensor Networks
 
Hybrid networking and distribution
Hybrid networking and distribution Hybrid networking and distribution
Hybrid networking and distribution
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
Analysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor networkAnalysis of different hierarchical routing protocols of wireless sensor network
Analysis of different hierarchical routing protocols of wireless sensor network
 
eeca
eecaeeca
eeca
 
Leach & Pegasis
Leach & PegasisLeach & Pegasis
Leach & Pegasis
 
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
COMPARISON OF ENERGY OPTIMIZATION CLUSTERING ALGORITHMS IN WIRELESS SENSOR NE...
 
Wireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEECWireless Sensor Networks LEACH & EDEEC
Wireless Sensor Networks LEACH & EDEEC
 

Viewers also liked

新聞攝影
新聞攝影新聞攝影
新聞攝影Jaing Lai
 
Smau Milano 2012 Igor Falcomata
Smau Milano 2012 Igor FalcomataSmau Milano 2012 Igor Falcomata
Smau Milano 2012 Igor FalcomataSMAU
 
Health Decisions Webinar: The Five Levers of Management Control for Your Heal...
Health Decisions Webinar: The Five Levers of Management Control for Your Heal...Health Decisions Webinar: The Five Levers of Management Control for Your Heal...
Health Decisions Webinar: The Five Levers of Management Control for Your Heal...Si Nahra
 
Amazing illusion paintings .(catherine)
Amazing illusion paintings .(catherine) Amazing illusion paintings .(catherine)
Amazing illusion paintings .(catherine) Catherine Dewilde
 
Servicios públicos domiciliarios
Servicios públicos domiciliariosServicios públicos domiciliarios
Servicios públicos domiciliariosJulio Valdés Silva
 
三星上將梨
三星上將梨三星上將梨
三星上將梨Jaing Lai
 
O Dia da Caridade
O Dia da CaridadeO Dia da Caridade
O Dia da CaridadeHelio Cruz
 
Portafolio Digital
Portafolio DigitalPortafolio Digital
Portafolio Digitaleducadoras
 
1435 flor de-nieve-(menudospeques.net)
1435 flor de-nieve-(menudospeques.net)1435 flor de-nieve-(menudospeques.net)
1435 flor de-nieve-(menudospeques.net)Menudos Peques
 
美的欣賞
美的欣賞美的欣賞
美的欣賞Jaing Lai
 
Tracey Gyateng: The NPC Data Lab, 30 June 2014
Tracey Gyateng: The NPC Data Lab, 30 June 2014Tracey Gyateng: The NPC Data Lab, 30 June 2014
Tracey Gyateng: The NPC Data Lab, 30 June 2014Nuffield Trust
 
Centro Cultural \"IRIE\" - Movimiento Juvenil de Álvarez
Centro Cultural \"IRIE\" - Movimiento Juvenil de ÁlvarezCentro Cultural \"IRIE\" - Movimiento Juvenil de Álvarez
Centro Cultural \"IRIE\" - Movimiento Juvenil de Álvarezguestba520c
 
Aristotle's University of Thessaloniki - Certificate of Graduat
Aristotle's University of Thessaloniki - Certificate of GraduatAristotle's University of Thessaloniki - Certificate of Graduat
Aristotle's University of Thessaloniki - Certificate of GraduatNIKOLAOS LEFAS
 
Aquarellen marcel reynaert (catherine)
Aquarellen marcel reynaert (catherine)Aquarellen marcel reynaert (catherine)
Aquarellen marcel reynaert (catherine)Catherine Dewilde
 
Henri de toulouse lautrec (catherine)
Henri de toulouse lautrec    (catherine)Henri de toulouse lautrec    (catherine)
Henri de toulouse lautrec (catherine)Catherine Dewilde
 
06 fresagem-130213120447-phpapp02
06 fresagem-130213120447-phpapp0206 fresagem-130213120447-phpapp02
06 fresagem-130213120447-phpapp02Sylvielly Sousa
 

Viewers also liked (20)

Bienvenida Cris
Bienvenida CrisBienvenida Cris
Bienvenida Cris
 
新聞攝影
新聞攝影新聞攝影
新聞攝影
 
Smau Milano 2012 Igor Falcomata
Smau Milano 2012 Igor FalcomataSmau Milano 2012 Igor Falcomata
Smau Milano 2012 Igor Falcomata
 
Health Decisions Webinar: The Five Levers of Management Control for Your Heal...
Health Decisions Webinar: The Five Levers of Management Control for Your Heal...Health Decisions Webinar: The Five Levers of Management Control for Your Heal...
Health Decisions Webinar: The Five Levers of Management Control for Your Heal...
 
Amazing illusion paintings .(catherine)
Amazing illusion paintings .(catherine) Amazing illusion paintings .(catherine)
Amazing illusion paintings .(catherine)
 
Servicios públicos domiciliarios
Servicios públicos domiciliariosServicios públicos domiciliarios
Servicios públicos domiciliarios
 
otro Manchego
otro Manchegootro Manchego
otro Manchego
 
三星上將梨
三星上將梨三星上將梨
三星上將梨
 
O Dia da Caridade
O Dia da CaridadeO Dia da Caridade
O Dia da Caridade
 
Portafolio Digital
Portafolio DigitalPortafolio Digital
Portafolio Digital
 
1435 flor de-nieve-(menudospeques.net)
1435 flor de-nieve-(menudospeques.net)1435 flor de-nieve-(menudospeques.net)
1435 flor de-nieve-(menudospeques.net)
 
美的欣賞
美的欣賞美的欣賞
美的欣賞
 
Tracey Gyateng: The NPC Data Lab, 30 June 2014
Tracey Gyateng: The NPC Data Lab, 30 June 2014Tracey Gyateng: The NPC Data Lab, 30 June 2014
Tracey Gyateng: The NPC Data Lab, 30 June 2014
 
LenLiter4
LenLiter4LenLiter4
LenLiter4
 
Centro Cultural \"IRIE\" - Movimiento Juvenil de Álvarez
Centro Cultural \"IRIE\" - Movimiento Juvenil de ÁlvarezCentro Cultural \"IRIE\" - Movimiento Juvenil de Álvarez
Centro Cultural \"IRIE\" - Movimiento Juvenil de Álvarez
 
El llibre digital a la universitat / Núria Gallart
El llibre digital a la universitat / Núria GallartEl llibre digital a la universitat / Núria Gallart
El llibre digital a la universitat / Núria Gallart
 
Aristotle's University of Thessaloniki - Certificate of Graduat
Aristotle's University of Thessaloniki - Certificate of GraduatAristotle's University of Thessaloniki - Certificate of Graduat
Aristotle's University of Thessaloniki - Certificate of Graduat
 
Aquarellen marcel reynaert (catherine)
Aquarellen marcel reynaert (catherine)Aquarellen marcel reynaert (catherine)
Aquarellen marcel reynaert (catherine)
 
Henri de toulouse lautrec (catherine)
Henri de toulouse lautrec    (catherine)Henri de toulouse lautrec    (catherine)
Henri de toulouse lautrec (catherine)
 
06 fresagem-130213120447-phpapp02
06 fresagem-130213120447-phpapp0206 fresagem-130213120447-phpapp02
06 fresagem-130213120447-phpapp02
 

Similar to M045077578

IRJET- LEACH Protocol for Wireless Sensor Network
IRJET-  	  LEACH Protocol for Wireless Sensor NetworkIRJET-  	  LEACH Protocol for Wireless Sensor Network
IRJET- LEACH Protocol for Wireless Sensor NetworkIRJET Journal
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKijngnjournal
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Networkjosephjonse
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...acijjournal
 
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...IJERA Editor
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...IRJET Journal
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...ijwmn
 
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...iosrjce
 
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes ijcisjournal
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODijwmn
 
An Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSNAn Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSNIOSR Journals
 
PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...
PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...
PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...IAEME Publication
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET IJCSEA Journal
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networkseditor1knowledgecuddle
 

Similar to M045077578 (20)

20320130406029
2032013040602920320130406029
20320130406029
 
IRJET- LEACH Protocol for Wireless Sensor Network
IRJET-  	  LEACH Protocol for Wireless Sensor NetworkIRJET-  	  LEACH Protocol for Wireless Sensor Network
IRJET- LEACH Protocol for Wireless Sensor Network
 
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORKSIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
SIMULATION BASED ANALYSIS OF CLUSTER-BASED PROTOCOL IN WIRELESS SENSOR NETWORK
 
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor NetworkSimulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
Simulation Based Analysis of Cluster-Based Protocol in Wireless Sensor Network
 
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
Enhancement of Improved Balanced LEACH for Heterogeneous Wireless Sensor Netw...
 
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
An Improved Deterministic Energy Efficient Clustering Protocol for Wireless S...
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
 
M017358794
M017358794M017358794
M017358794
 
15 ijcse-01236
15 ijcse-0123615 ijcse-01236
15 ijcse-01236
 
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
A Wallace Tree Approach for Data Aggregation in Wireless Sensor Nodes
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHODINCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
INCREASING WIRELESS SENSOR NETWORKS LIFETIME WITH NEW METHOD
 
An Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSNAn Energy Efficient Protocol To Increase Network Life In WSN
An Energy Efficient Protocol To Increase Network Life In WSN
 
PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...
PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...
PERFORMANCE ANALYSIS OF ENERGY EFFICIENT SCALABLE HEIRARCHIAL PROTOCOL FOR HO...
 
New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET New Scheme for Secured Routing in MANET
New Scheme for Secured Routing in MANET
 
Cluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor NetworksCluster Head Selection for in Wireless Sensor Networks
Cluster Head Selection for in Wireless Sensor Networks
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

M045077578

  • 1. Aravind Srinivas S P et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.75-78 www.ijera.com 75 | P a g e Effect of Blackhole Attack on Single Hop and Multihop Leach Protocol Siddiq Iqbal, Aravind Srinivas S P, Sudarshan G, Sagar S Kashyap IEEE student member Assistant professor, Dept. of Telecommunication, B.M.S. Institute of Technology, Bangalore Dept. of Telecommunication B.M.S. Institute of Technology, Bangalore Dept. of Telecommunication B.M.S. Institute of Technology, Bangalore Dept. of Telecommunication B.M.S. Institute of Technology, Bangalore Abstract Wireless micro sensor networks provide reliable monitoring of remote areas for data-gathering. Due to the limited battery capacity of sensor nodes, energy consumption plays an important role in the operation of WSN. This can be improved by using a protocol called Low energy adaptive clustering hierarchy (LEACH).Malicious attacks are generated in the network due to power supply, processing abilities and capacity for high power radio transmission. In this paper one such attack namely BlackHole attack and its effect on single hop LEACH and multihop LEACH has been compared, simulated and analyzed. Index terms-WSN, LEACH, Blackhole, Multi hop, Residual Energy. I. INTRODUCTION Wireless sensor networks consists of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions such as temperature, sound, vibration, pressure, motion or pollutants at different locations. It combines sensing computation and communication into a single tiny device [7]. LEACH is an application specific hierarchical protocol formed to reduce power consumption which involves data aggregation or fusion and subsequent transmission to base station[3]. All non-cluster-head nodes must transmit their data to the cluster-head, while the cluster- head node must receive data from all the cluster members, perform signal processing functions on the data (e.g., data aggregation), and transmit data to the remote base station. II. LEACH PROTOCOL LEACH has two phases 1) Setup phase 2) Steady phase Figure 1: Flowchart of LEACH Set-Up Phase: Cluster is constructed by Cluster Head election. Each node decides independent of other nodes if it will become a Cluster Head or not[6]. This decision takes into account when the node served as a Cluster Head for the last time. Its main functions are  organizing the network into clusters  Advertisements of the cluster heads  Transmission schedule creation RESEARCH ARTICLE OPEN ACCESS
  • 2. Aravind Srinivas S P et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.75-78 www.ijera.com 76 | P a g e Steady phase: Steady phase is further divided into 2 parts:  Schedule Creation  Data Transmission In the steady working stage, each member node of the cluster send data to the corresponding cluster head during the allotted communication slot. After receiving all the data, the cluster head aggregate it and sends to the sink. In order to minimize the power consumption, the steady phase duration is kept far greater than the cluster constructing phase duration. Due to dynamic topology, limited resources and open nature of wireless medium it makes it easier for the outsiders to attack and interfere with the network[5]. Hence LEACH protocol is prone to several attacks. One of such attack is blackhole attack. III.BLACKHOLE ATTACK ON MULTI- HOP LEACH PROTOCOL A. Multi hop LEACH When the network diameter is increased, the distance between the base station and the cluster head increases. Hence the leach routing protocol is not helpful. Thus, in order to increase the energy efficiency multi-hop communication within the cluster is done. The communication between the cluster head and the sink is done via multiple hops by choosing an optimal path Figure 2: Multi hop LEACH B. Multihop Algorithm In the multihop LEACH network, each node does 2 types of transmission [2]. One is to send the data collected by it to its local cluster head. The other is to forward the data to other nodes as part of the multihop transmission if it is part of the routing path of any other node. The multihop routing path used here is a static route calculated based on the least distance factor. The routing path for any node can be determined by using the following algorithm: Step 1: the node whose route needs to be determined is considered to be the source node. Step 2: The nodes which fall in the transmission range of this source node are shortlisted. Step 3: Among these nodes, the node which has the shortest distance from the base station is considered as the next hop of the source node. Step 4: This next hop node is then considered as the source node and steps 2 and 3 are repeated to find out the subsequent next-hops. Step 5: The above step is repeated until the base station node is part of the shortlisted nodes i.e. it falls in the transmission range of a next-hop node. Step 6: All the next-hop nodes are stored in an array for later use. C. Blackhole attack: This is a type of DOS attack where the attacker collects the data and then later drops it. Since attacker is having higher initial energy than the other nodes it becomes one of the cluster heads in the first round and even in later rounds, as it is not consuming any energy for data transmission [1].Hence it becomes cluster head in almost all the rounds. After becoming cluster head it receives data from all of its cluster members, aggregate it and later does not forward the data to the base station [4]. Figure 3: blackhole attack IV.SIMULATION The simulation results shown were generated using MATLAB software. The parameter settings are as shown in table 1. To simulate the Blackhole attack, the parameters shown in table 1 are considered. Here, 5 of the 100 nodes are assumed to be compromised. These nodes do not transmit the data that they receive and hence affects the throughput of the network.
  • 3. Aravind Srinivas S P et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.75-78 www.ijera.com 77 | P a g e Table 1: Simulation parameters Parameter Value Network area 200m X 200m Number of rounds 2500 Number of nodes 100 Packet size 4000 Initial energy 0.5 J Data aggregation energy 5 X 10^-9 J Transmission/reception energy 50 X 10^-9 J Amplification energy 0.0013 X 10^-12 J Energy of free space signal 10 X 10^-12 J Sink position (100m,100m) Figure4: Graph of data transmitted in single hop and multi hop LEACH during the event of Blackhole attack. As seen from the figure 4 above the data transmitted during the single hop LEACH without attack is maximum. In multihop LEACH without attack the data transmitted is significantly less due to the higher energy consumption during multiple hops from the cluster head to the base station. In the event of a Blackhole attack, the effect of the attack on multi-hop LEACH is maximum resulting in least data being transmitted to the base station. In case of Blackhole attack on single hop LEACH the data transmitted is lesser than the basic LEACH but still higher than multi-hop LEACH without attack. In the operation of LEACH the data before being transmitted to the base station is aggregated at the cluster head and then transmitted as a single packet. Due to this the difference in data transmitted in all the above cases in the figure is minute. Figure 5: Graph of alive nodes in single hop and multi hop LEACH in the event of Blackhole attack. In case of Blackhole attack the energy consumption is less since the packets are not transmitted to the base station. This, results in the nodes staying alive for a longer duration. From the figure 5 it is evident that the single hop LEACH with the attack has nodes which are alive for a longer duration than the single hop LEACH without attack. In case of multi-hop LEACH with attack the nodes stay alive for a longer duration than multi-hop LEACH without attack but lesser than the single hop without attack. This is because the energy consumption during multiple hops in the network is more. In single hop LEACH the compromised node affects itself and its cluster members. In multi hop LEACH since the compromised node can be a part of the multi hop path it can affect other clusters as well. Hence energy consumption is more in multi hop LEACH Figure 6: Graph of residual energy in single hop and multi hop LEACH during the event of Blackhole attack.
  • 4. Aravind Srinivas S P et al Int. Journal of Engineering Research and Applications www.ijera.com ISSN : 2248-9622, Vol. 4, Issue 5( Version 7), May 2014, pp.75-78 www.ijera.com 78 | P a g e It is evident from the figure 6 that the residual energy of the single hop LEACH with attack is maximum since the energy consumption is less and the packets are not transmitted to the base station. The multi-hop LEACH with Blackhole attack has more residual energy than the LEACH protocols without attack and lesser than single hop LEACH with attack due to multiple hops. The residual energy of the LEACH protocols without attack is similar. V. CONCLUSION The goal of the blackhole attack is to collect as much data possible by the malicious nodes and later drop them. In this paper we are providing simulation results for data transmitted, number of alive nodes and residual energy by comparing single hop LEACH, multi hop LEACH and the effect of Blackhole attack on them. The data transmitted is least in the multi hop LEACH network affected by Blackhole attack and maximum in the network of single hop LEACH without attack. The nodes are alive for a longest duration in single hop LEACH with attack. The residual energy is highest in the single hop LEACH with attack. Hence, the impact of Blackhole attack is more on multi hop LEACH network than a single hop LEACH network. REFERENCES [1] Hierarchical Energy Efficient Intrusion Detection System for Black Hole Attacks in WSNs Samir Athmani, Djallel Eddine Boubiche and Azeddine Bilami, 978-1- 4799-0462-4/13/$31.00 ©2013 IEEE. [2] Improvement on LEACH Protocol of Wireless Sensor Network, Fan Xiangning, Song Yulin, 0-7695-2988-7/07 $25.00 © 2007 IEEE. [3] Performance Evaluation of LEACH Protocol in Wireless Network, M. Shankar, Dr .M. Sridar, Dr. M. Rajani, International Journal of Scientific & Engineering Research, Volume 3, Issue 1, January-2012 1 ISSN 2229-5518. [4] Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN by Meenakshi Tripathi,M.S.Gaur,V.Laxmi Malaviya National Institute of Technology, Jaipur, India 2013 published by Elsevier B.V. [5] Leach and Its Descendant Protocols: A Survey J. Gnanambigai, Dr. N. Rengarajan, K. Anbukkarasi International Journal of Communication and Computer Technologies Volume 01 – No.3, Issue: 02 September 2012 ISSN NUMBER: 2278- 9723. [6] An Energy Balanced Clustering Algorithm Based on LEACH Protocol Qian Liao, Hao Zhu 2nd International Conference 2012 on Systems Engineering and Modeling [7] A Review of Routing Protocols in Wireless Sensor Networks Prabhat Kumar, M.P. Singh and U. S. Triar National Institute of Technology Patna, Bihar, India International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 4, June - 2012 ISSN: 2278-0181