Article ID Journal Published Year Pages File Type
459748 Journal of Network and Computer Applications 2013 18 Pages PDF
Abstract

LEACH or Low-Energy Adaptive Clustering Hierarchy is a successful clustering-based routing protocol that recently has attracted a lot of attention in literature. However, this protocol is not prefect and has some deficiencies that other extensions of LEACH try to solve it. Security is one of the main problems of LEACH and many security attacks can be launched against this protocol. The need for security in LEACH protocol has inspired many researchers to design secure versions of this protocol and to make it resilient against insider and outsider attackers. In this paper, we discuss about the current state-of-the-art secure LEACH schemes that are proposed in literature. We briefly describe the security features of each solution and highlight their objectives, advantages and limitations. In addition, we classify secure LEACH schemes into cryptographic-based and trust-based solutions and review the major development in these two categories. Then, we present a qualitative comparison on secure LEACH schemes based on various security metrics. Finally, we conclude with open research issues.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, , ,