کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
459748 | 696277 | 2013 | 18 صفحه PDF | دانلود رایگان |
![عکس صفحه اول مقاله: Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks Analysis of Secure LEACH-Based Clustering Protocols in Wireless Sensor Networks](/preview/png/459748.png)
LEACH or Low-Energy Adaptive Clustering Hierarchy is a successful clustering-based routing protocol that recently has attracted a lot of attention in literature. However, this protocol is not prefect and has some deficiencies that other extensions of LEACH try to solve it. Security is one of the main problems of LEACH and many security attacks can be launched against this protocol. The need for security in LEACH protocol has inspired many researchers to design secure versions of this protocol and to make it resilient against insider and outsider attackers. In this paper, we discuss about the current state-of-the-art secure LEACH schemes that are proposed in literature. We briefly describe the security features of each solution and highlight their objectives, advantages and limitations. In addition, we classify secure LEACH schemes into cryptographic-based and trust-based solutions and review the major development in these two categories. Then, we present a qualitative comparison on secure LEACH schemes based on various security metrics. Finally, we conclude with open research issues.
Journal: Journal of Network and Computer Applications - Volume 36, Issue 4, July 2013, Pages 1243–1260