• Tidak ada hasil yang ditemukan

View of ASSESSING THE EFFECTIVENESS OF THE LEACH PROTOCOL IN SINKHOLE AND OTHER ATTACKS: A PERFORMANCE ANALYSIS

N/A
N/A
Protected

Academic year: 2023

Membagikan "View of ASSESSING THE EFFECTIVENESS OF THE LEACH PROTOCOL IN SINKHOLE AND OTHER ATTACKS: A PERFORMANCE ANALYSIS"

Copied!
10
0
0

Teks penuh

(1)

ASSESSING THE EFFECTIVENESS OF THE LEACH PROTOCOL IN SINKHOLE AND OTHER ATTACKS: A PERFORMANCE ANALYSIS

Anmol Jain, Dr. Navdeep Kaur Saluja

Abstract - Wireless Remote sensors (WSNs) will have a significant part in future advancements in the improvement of the digital actual society. Wireless Remote Sensors (WSNs) are networked sensor hubs that communicate remotely to collect data about the environment in general. Most hubs have minimal force and are distributed in a fragmented and carefully designed manner. Even though WSNs are quite common, there are certain real obstacles for carrying out security that are caused by asset limitations in memory, registration, battery life, and data transfer capability. Remote sensor networks have progressed from the idea that tiny remote sensors may be used to collect data from the actual climate in a variety of situations, ranging from chasing wildfires and detecting species to managing farms and current checks. Each distant sensor transmits data to a base station. In data transmission to the base station, sensors cooperate with one another.

In order to highlight the widespread nature of the sensors, remote sensor networks are sometimes referred to as widespread sensor networks. WSNs, or remote sensor networks, have several potential uses that promote a happy and savvy financial existence. Examples of important uses in WSNs include energy conservation restricting the rare wellsprings of energy, commotion and climatic observation reducing pollution, and medical care monitoring enhancing the wellbeing. The major techniques used in WSNs to improve application execution include guiding systems that discover the best route to the target, energy-saving strategies that increase the presence of sensors and security standards that ensure our protection. In this study, we will evaluate the effectiveness of the LEACH Protocol in sinkhole and other types of attacks. We will analyse the performance of the LEACH protocol by creating a performance graph.

Keywords: Sinkhole Attack, Wireless Sensor Network (WSN), low energy adaptive clustering hierarchy (LEACH), MAC, Cluster Head (CH), Secure Low Energy Adaptive Clustering Hierarchy (SLEACH), HELLO.

1 INTRODUCTION

In wireless sensor networks, small sensors are used (WSN) to sense physical parameters and data to be sent to a central station which is known as sink nodes or in other words base station.

Network authenticity is the main responsibility since WSN is used in an adverse environment. The most crucial WSN component is the effective deployment of sensors while preserving the required detection performance [1].

The nodes may be in stillness or move about. They are not sure of their existence. They might be the same or non- homogeneous. Sensor nodes share data via wireless links; the data is sent ahead to a sink that has connections to other networks or can be used locally, likely via multiple hops relaying [2]. These networks (WSNs) have gained prominence as a low- cost solution for collection of and measurement. WSNs offer a number of benefits, one of which is their simplicity in deployment, which is made possible by the use of routing protocols that automatically set up the network. WSN

security must be protected against malicious assaults if they are to be utilized to manage critical infrastructure, such as the delivery of water. [3] Base stations and numerous nodes make up a wireless network (WSN) (wireless sensors).

These networks use the network to convey data to a single location while monitoring physical factors like temperature, pressure and sound. WSN is used to understand, analyze, store and also to mine the data. [4] Below figure 1.1 shows how components in WSN works.

Figure 1.1: Wireless Sensor Network Components and working

(2)

Figure 1.1 WSN controls and monitors the environment in a particular area using sensors and an inbuilt CPU. They are connected to the BS, which serves as the processing hub for the WSN System. To exchange data, the base station of a WSN system is connected to the Internet. These networks are made to be resilient and secure since they are frequently utilized in unfavorable circumstances. They regulate the elements of the environment, including pressure, temperature, and humidity. WSNs keep track of environmental variables including pressure, temperature, and other atmospheric elements [4]. Sybil, selective routing, Sinkhole, Wormhole, and HELLO FLOOD are all attacks that WSNs are vulnerable to. The sinkhole attack is a relatively common occurrence. The assaulted nodes are capable of offering a high-quality, single-hop link to the base station, causing neighboring nodes to diverge from the real path. And data forward to the BS are either discarded or sent to the sinkhole attacker, severely compromising the network's load balancing. It can easily be attached with other attacks to cause more network damage [5]. Future mission applications would benefit greatly from the deployment of wireless sensor networks. If we look at the most recent research, we can see that a lot of effort is being put on routing, or determining the best effective method for nodes to interact with one another. The LEACH routing protocol was also explored in this work. The basic workings of it have been described above, along with its benefits. Furthermore, a network time protocol server is added into the WSN to synchronize the time of all sensor nodes for the purpose of modifying a key that is kept hidden. The results of simulations show that detecting DoS is possible. A successful attack and cipher function can be used to sensor the networks that are wireless.

1.1 Definition of Wireless Sensor Networks

A computational system called a mote, also known as a wireless sensor node, consists of a sensing device, CPU, transceiver, memory and power source.

The sensing apparatuses identify the surroundings and gather information that reflects the observed physical conditions.

Prior to being forwarded through multi- hop wireless connection to the base station for additional processing, the sensor data is routed to a local processor for initial processing. Motes are set up with the necessary operational settings and security credentials before being deployed. To gather precise and synchronized data, a large number of sensor nodes are typically dispersed around the region of interest and come together to create a wireless swarm [6]. It has a numerous number of uses in many of the industries, including the military, agricultural, aviation, and medical, owing to its self-organization, data dynamics, anti-interference, and anti-damage properties. During the WSN research phase, it is imperative to conduct in- depth study into the important techniques of location awareness;

networking, data fusion, and energy management. Wireless Sensor Networks is a resource-constrained system in which security is critical. One of the most well- known cluster-based routing protocols is LEACH. In disciplines like computer science, electronics, and other areas, WSN is important. Ad hoc networks known as WSNs can be employed in hostile and distant environments. The network's unsupervised deployment technique makes it more susceptible to various attacks. Vulnerability can be triggered in a variety of ways, from both inside and outside perspectives [7].

A base station processes sensor data that is transmitted from multiple nodes in a wireless sensor network. It is common knowledge that a many-to-one communication like this is incredibly susceptible to a security attack. Using incorrect routing information, an intrusive party collects nearby nodes to launch a sinkhole attack, which is followed by selective forwarding or data manipulation [3]

2 LITERATURE REVIEW

Hoon Kim and Sang-wook Han et al. [1]

“An Efficient Sensor Deployment Scheme for Large-Scale Wireless Sensor Networks”, In this paper a deployment plan for large-scale WSNs that meets the average detection probability requirements has been proposed. Unlike the uniform deployment method, the suggested scheme takes into account the

(3)

local event incidence rate information while deploying sensors. In order to minimize the total number of sensors while still satisfying the requirements for average detection probability, an ideal problem for calculating the number of sensors for each local region has been put forth, as well as an algorithm for finding the optimal answer.

Ankit Solanki Sarvajanik and Niteen B. Patel et al. [2] “Niteen B. Patel Sarvajanik College of Engineering and Technology”, Because the majority of wireless sensor networks are battery- powered, energy efficiency is one of the most significant factors. In order to create the wireless sensor network,the designer must select a routing protocol that consumes the least amount of resources.

Simulation findings reveal that by properly adjusting the network, the suggested protocol increases the lifetime of the network by 40% to 75%

parameters. The created algorithm makes an assumption that each node will deliver a single piece of data in each round.

Ahmad Salehi S., M.A. Razzaque, Parisa Naraei, Ali Farrokhtala et al. [3] “A Survey on Detection of Sinkhole Attack in Wireless Sensor Network”, The need of wireless sensor networks (WSNs) has been growing day by day due to its low-cost, self-organized and easy to use feature. A main advantage of WSNs is ease of deployment. Maintaining the integrity of the WSN is essential if we want to be able to defend against malicious assaults and utilize WSNs to monitor key infrastructure, such as water healthcare monitoring. Routing attacks are often possible against the routing protocols used with WSNs, which can obliterate the network's connection.

Manpreet kaur, Amarvir Singh et al.

[4] “A Survey on Detection of Sinkhole Attack in Wireless Sensor Network”, At the network layer, sinkhole attacks take place. It's a different kind of black hole attack. It additionally lessens the exhibitions of the organization. We sent a decentralised remote sensor network in a certain area with a predetermined number of hubs. After transmitting the remote sensor network, we used the AODV routing protocol to build up the path from the source to the destination.

To create a path to the destination, the source node floods the network with route

request packets, and the nearby destination nodes respond to the source node with route reply packets. We choose the optimal way from the many paths available to send the packets from the source to the destination after the route request packets and the route reply packets. The destructive hub that is now in place is capable of causing sinkhole attacks and altering the deferral between the source and the objective. By figuring the postponement per bounce for every hub existing in the way the presence of the malevolent hub is recognized.

Fang-Jiao Zhanga,b , Li-Dong Zhaia et al. [5] “Sinkhole attack detection based on redundancy mechanism in wireless sensor networks”, Various forms of attacks, such as Sybil, selective forwarding, Sinkhole Wormhole, and HELLO FLOOD, can be used against wireless sensor networks. Sinkhole attack, chiefly examined in this paper, is a moderately regular attack. The hubs attacked guarantee to have the option to give a solitary - jump, top notch way to the base station, which pulls in the neighbor hubs to change the first course.

Furthermore, bundles shipped off the base station are disposed of or sent to the sinkhole attacker, along these lines truly harming the heap adjusting of the network. It is handily joined with different attacks, making more prominent harm the network.

Asaduzzaman and Hyung Yun Kong et al. [6] “A Survey on Detection of Sinkhole Attack in Wireless Sensor Network, In journal of communications and networks”, Remote sensor networks is a self coordinated network it implies it has no unified control station like passage way. WSN has a significant component that is grouping based steering which empower the WSNs to sucks a few advantages of cell based remote organizations. We first partition the entire sensor network into varying numbers of clusters, choose a CH for each cluster, and then localise the network's coordination and control. For wireless sensor networks, LEACH is a clustering- based technique that uses little energy.

The LEACH procedure runs from one round to the next. Each cycle of the LEACH protocol consists of three phases:

the cluster setup phase, the steady-state phase, and the advertisement phase.

(4)

S.Ranjeeth Kumar, A.Umamakeswari et al [7] “SSLEACH: Specification based Secure LEACH Protocol for Wireless Sensor Networks”, Wireless sensor networks needs limited resources. The LEACH Protocol also consumes less resource. LEACH protocol operates in two states: 1. Setup Phase and Steady State Phase. In setup phase, if we want to create a cluster then cluster head is selected whose probability and energy level is highest. In the steady-state phase, the node delivers the data in the designated slot to the cluster head. The CH aggregates the data collected from the nodes and sends to the Base Station. In LEACH protocol, there is no authentication for cluster head node so that this protocol is not secure. Now, the cluster head sends the time slot for data transmission to its member nodes. The prowlers may simply hack this message because it is insecure. S-LEACH is the LEACH variant that is the safest (Secure- LEACH). For authentication, the S-LEACH protocol uses cryptographic techniques.

3 MOTIVATION

Wireless sensor network significantly reduces the cost and complexity of owning and operating networks and connected nodes and its communications. In this network thousands of smaller sensors are combined. These sensors are all used to gather data about the immediate environment and transmit it to data centers. Because of its data dynamics, self-organization, anti-interference, and anti-damage capabilities, it has a wide range of applications in a number of industries, including the military, agriculture, aviation, area monitoring, healthcare monitoring, and medicine.

There is no organization or procedure used to verify the information transmitted by the WSN nodes.

3.1 Problem Statement

● Sinkhole attacks in WSNs cause significant network harm. The ability to launch further attacks like selective forwarding, spoofing, and routing information drops or modifications is one effect of the sinkhole assault. In WSNs, security is a major concern. Many real-world applications of WSNs are useless without availability and data

confidentiality. As a result, a lot of research has gone into finding security solutions for these networks.

● WSNs' protection is threatened at almost every layer of their protocol stack by the sinkhole attack. The main trick used in the attack is that a rogue node fools its neighbors into sending traffic to it by pretending to have the fastest route to the base station. The hack may put several crucial security measures in danger 3.2 Leach Protocol

TDMA is the foundation of the LEACH (Low Energy Adaptive Clustering Hierarchy) MAC protocol. This protocol's primary objective is to prolong the existence of wireless sensor networks by consuming less energy during the construction and maintenance of Cluster Heads. Network protocols like LEACH are required because a network node loses all functionality when its battery dies. With the help of this protocol, we can prolong the node's lifespan so that it only needs to perform the absolute least amount of labor necessary for data transmission.

The Set-up Phase and Steady Phase are the two stages that each round of the LEACH treatment has two of [23].

3.2.1 Setup phase:

As a CH, one of the distributed nodes will receive messages from the Base Station and transmit them to the other distributed nodes [24]. The primary objective of the Set-up procedure is to establish clusters and pick the sensor node with the highest energy as the cluster head for each cluster [23]. Task Ordination (TO), Cluster Configuration, and Scheduling are the three stages of the setup process. Each node in the TO stage is assumed to be a Normal Node (NN). The number of nodes previously designated as CH, the energy level, and the percentage of current CHs (which ranges from 5% to 10%) all play a role in determining which nodes opt to be a CH. For CH selection, only nodes whose energy value is equal to or higher than the sum of all nodes' energies will be taken into account..

(5)

Fig – 3.1: Setup Phase in LEACH 3.2.2 Steady state:

Non-CHs send data to CH, who then aggregates the data and sends it to the sink node. The steady phase lasts a little longer than the setup phase. When data is transmitted between nodes, the cluster- head is preserved.

Fig - 3.2: Steady Phase in LEACH However, cluster heads are chosen at random, without regard for the node's geographic location or residual energy.

Every node in the network generates a random number between 0 and 1, and if the number is less than T (n), the node is considered the cluster head [24]. This algorithm can be used to choose cluster heads stochastically (at random):

Where p represents the probability of being a Cluster Head, r represents the selected rounds, r mod (1/p) represents the number of previous Cluster Heads, and G represents the set of non-cluster heads in the last 1/p rounds. The node becomes a cluster-head, if n<T(n).

Each node in the algorithm is designed to become a cluster-head at least once.

LEACH-C is a modified variant of this protocol (or LEACH Centralized). This version uses a deterministic threshold algorithm that takes the amount of energy in the node.

3.3 Leach Protocol in Sinkhole Attack A type of active attack known as a sinkhole pulls all traffic to a compromised node. By setting a high value with respect to the routing metric, the compromised node attracts the attention of the other nodes. As a result, the attacker obtains all of the packets and continues to perform additional attacks such as selective routing, packet alteration, or packet falling. The infected node uses a different measure to attract the packet to itself depending on the routing protocol. The infected node will advertise that it has a greater connection quality, drawing packets, if the Mint route protocol is being used, for instance. Fake packets can be transmitted to sensor nodes in addition to metrics to include the hacked node in the packet flow direction. The hacked node can draw packets if the DSR protocol is being used for routing by sending free messages that appear to be closer to the destination or by delivering a bogus RERR message that claims the connection is about to break. The method uses a Geographical frailty survival model and distributed monitoring to detect sinkhole attacks by analyzing a specific area in the sensor sector. The next step in the identification of intruders in the impacted area is mitigation. This method of locating sinkhole nodes is extremely computationally intensive. As a result, the sinkhole node poses a serious threat to the network's routing layer and reduces the routing protocol's performance. To counter sinkhole attacks, cryptographic schemes such as key establishment and key exchange are used. The methods used by intruders to launch attacks and the effects of those attacks on the network are described in this analysis report. The sinkhole attack extends the network lifetime by lowering the sensor node's energy level. When an attack occurs in a network, the packet distribution ratio suffers a significant reduction. The sinkhole assault will be used as a launch pad for future attacks [25]. LEACH

(6)

protocol in sinkhole attack performs non- efficiently due to high energy consumption by nodes.

3.4 Leach Protocol in Without-Sinkhole Attack

LEACH protocol is widely used clustering routing protocol for WSNs that want to save space. Its central concept is to schedule intra cluster communication using Time Division Multiple Access (TDMA). Sensor nodes send their data to the cluster head in their assigned time slot and then go into sleep mode for the rest of the cycle. The CH is chosen probabilistically and in a distributed manner in each round, without the need for the nodes to exchange control messages. In addition, cluster head responsibilities rotate among all nodes to ensure that their energy is spent evenly.

As opposed to direct communication, LEACH achieves an energy savings of 7x to 8x in comparison to direct contact between nodes and BS.

4 PROBLEM DEFINITION

In this article, the security categorization literature is thoroughly reviewed. We'll examine a number of wireless sensor network issues in this study. Three significant issues that we are working to address are wormhole, sinkhole, and Sybil attacks. Wireless sensor networks are commonly used networks, but when their output deteriorates, it poses a significant security risk. The major issue in WSN is efficiency when it encounters a sinkhole attack in a network. When sinkhole attack takes place, the energy consumption of nodes increases and the efficiency decreases. The figure 4.1 shows how the sinkhole attack takes place in network. By this we clearly understand the problem in a network.

Fig 4.1: Sinkhole attack in WSN

Attackers might introduce a fake network node or compromise a real network node to carry out sinkhole attacks. By claiming to be the quickest path to the base station, the rogue node attempts to reroute traffic away from other nodes. All nodes around the sinkhole as well as any nodes closer to the base station than the sinkhole are drawn to it. The network's security is therefore at danger since the intruder node or sinkhole may easily modify the data. Attacks using sinkholes can come from both within and outside the network. In the first case, the invader may use a compromised node to launch the attack, whereas in the second, they could use it to establish a direct connection to the base station and entice other nodes to pass traffic through it. The goal of this study is to address the long- standing open question of how to maximize security in wireless sensor networks. A technique is being created in particular to meet the core security goals of WSNs, which vary depending on the WSN application. As a result, due to the diversity of security objectives, no single security approach can be proven to be the optimum fit. Ranking security objectives should be done with care, starting with an analysis of the security threats to a WSN and then moving on to the application.

We begin by compiling a complete list of security threats, which we then categories and analytically correlate with the security assessment framework. It gives a real time testing for security tools before WSNs accepts them for it. For reasons such as data confidentiality, communication continuity, and protection from malevolent users, security is one of the WSN's most pressing issues. The authentication techniques proposed are used to ensure that Nodes are aware of one another and communicate well.

Authentication in the nodes as well as authentication in the packets is both required.

5 PROPOSED METHODOLOGY

Based on our observations of the last tactic's shortcomings in terms of effectiveness and quality, our study illustrates a cutting-edge approach that is both successful and energy-efficient. In this test, we simply assess a LEACH protocol's performance against sinkhole and non-sinkhole assaults. The best node

(7)

out of all nodes is the cluster node. All nodes are under the control of a cluster.

Each cluster node is connected to the base station. The following describes the suggested algorithm:

1. Establish the network size.

2. Decide a compromise node.

3. Assign each node its starting energy.

4. Begin the rounds to choose the CH using the LEACH procedure.

5. After each node, compute the number of living nodes, energy used, CH, and data sent.

6. Use a network sinkhole attack.

7. Go back to step 5.

8. Draw graphs for steps 5 and 7 in step 8.

9. Evaluate the effectiveness of the LEACH technique both with and without an assault..

1All of the nodes in wireless sensor networks are sensor-based. Among all nodes one node is selected as Cluster Head. Cluster head is the best node among all nodes. In each round, the cluster head changes. For selecting the cluster head we compute the value of each node. This section evaluates the sensor deployment performance of the suggested strategy, utilizing the average event detection probability and the overall sensor count as performance metrics. The suggested uniform deployment algorithm is compared to the scheme.

6 SIMULATION SETUP

In this chapter, we are discussing the software package platform and simulation tool utilized in the simulations. Chosen simulation parameter and also the varied metrics thought about within the performance analysis of the proposed scheme. Finally, we'll discuss about the performance metrics used within the comparisons. MATLAB version 21 is used.

A software programme called MATLAB may be used to perform calculations, analyse data, create algorithms, perform simulations and modelling, and create graphical displays and graphical user interfaces. It includes:

⮚ Math and computation

⮚ Algorithm development

⮚ Data acquisition

⮚ Data analysis and examination.

⮚ Scientific and engineering graphics

⮚ Application development, including graphical user interface building

MATLAB is viewed as a collection of tools that may be extremely beneficial in solving various engineering and scientific process problems. A key objective of engineering analysis and methodology may be to obtain answers numerically, and MATLAB is the ideal tool for this. This curriculum has significant benefits for many engineering science subfields, including circuit analysis, device design, signal processing, filter design, system analysis, antenna design, microwave engineering, photonics engineering, computer engineering, and many more. It also has powerful graphic and visualization capabilities Understanding how to use MATLAB is the first step in the victimization process. It's important to keep in mind that all programmers and functions in MATLAB are written in the same way, even if the front-end and interface for machines with various operating systems are often different.

Only a select few commands, such as those for managing files and interacting with external hardware like printers, may change for multiple operating systems.

6.1 Result Analysis

Wireless sensor networks are those networks which completely rely on batteries. If any sensor consumes more energy the battery dies and sensors stop working. To increase the performance of WSNs when there is no attack we can use LEACH protocol. As we also know that WSNs are prone to many attack. If WSNs encounter sinkhole attack, then the output of network degrades because it consume more energy due to which the sensors dies early and stop working.

Performance Measures: The graph which is given below shows the performance of LEACH protocol in wireless sensor networks with sinkhole attack and without sinkhole attack. When sinkhole attack start attacking on any network, the compromise node attract all the information of cluster head and advertise false routing which cause more data transmission and consume more energy due to which efficiency decreases. In this part, we put the recommended algorithm to the test using MATLAB. Two fundamental performance metrics are the detection time and false positive rate.

Because simulations were run until all malicious nodes had been removed, the

(8)

false negative rate is not taken into consideration.

Process by process screenshot and description for that:

Figure 6.1 – Graph between data transmission and number of rounds In this fig 6.2 figure above the complete framework between data transmission and number of rounds. It shows that when number of rounds is performed, cluster head changes in each round.

When sinkhole attack takes place the compromise node attract all the information which causes more enery consumption but without sinkhole attack it consume less energy and give efficient output.

Figure 6.2 Graph of Energy consumption and number of rounds.

Fig 6.3 shows the comparision between energy consumption with sinkhole attack and without sinkhole attack. The dotted line shows that energy consumption with sinkhole attack and the red line shows the energy consumption without attack.

Figure 6.3 Graph between count of CH and number of round

The figure 6.4 shows the computation of cluster head value for each round. In each round we get new cluster head and also in each round we discard dead nodes and list out the alive node for next round.

Figure 6.4: Graph between alive node and number of rounds

Parameters Description:

Efficiency: In general terms, efficiency means the nodes which consume less energy and alive for long time duration.

On the basis of efficiency, we can check the output of LEACH protocol. The total 25 round are performed. In each round, Cluster head changes and some nodes are discarded those are dead. Those nodes are alive they considered for next round.

Energy Consumption: Energy consumption is the amount of energy a node uses to execute a task. If the node uses less energy than it uses, it is efficient. Since they enable designers to optimize energy usage in WSN nodes, energy consumption and modeling are essential factors in the design and implementation of Wireless Sensor Networks (WSNs). Having a thorough grasp of the sources of energy utilization is the first step in decreasing energy consumption in WSNs. In wireless sensor networks, energy is a finite resource.

Indeed, lowering power consumption is

(9)

critical for extending the life of low-power sensor networks. Wireless sensor networks are made up of small, self- contained devices that can communicate wirelessly. One of the most crucial issues to deal with in order to maximize the technology's use in practical applications is reducing power usage. As a result, a suitable power model is required for the evaluation of wireless sensor networks.

The energy is used to calculate the sensor node's lifetime. Sensor node parameters

are measured. Given the increase of research in this field over the last few years, the broad range of applications that could be aided by such a technology According to the proposed model, the expected lifetime of a battery-powered sensor node can be greatly enhanced A statistical comparison of the values returned as a function of retrieval time by various process algorithms, throughput, and other parameters may be seen in the table below.

Parameters Existing work Proposed Work

Simulator NS2-2.35 MATLAB 2021

Number of nodes 37 100

Antenna type Omni-directional Omni-directional Plots Energy consumption vs

number of packet loss

Energy Consumption vs Number of rounds

Rounds in selected CH Unknown 2500

Table 6.5: statistical comparison.

The above table represent the number of data values from the data and algorithm is

performed.

Figure 6.6 : Comparison of Line graph for technique analysis

Using the chart library provided by Microsoft, the line graph is printed, and further analysis is simple to complete.

The x axis in the graph above represents the data that was used to get posts for the selected dataset during query processing.

The graph representation demonstrates our suggested algorithm's effectiveness and its superior performance to the low forecasting value.

7 CONCLUSION

This study suggested a test to identify a sinkhole attack in a remote sensor network. Now a day’s Wireless sensors network is one of the important technology. It is also one of the major applications of IoT A unique class of networked system known as a wireless

sensor network operates in an ad hoc setting with very minimal computation and energy resources. Wireless sensor network security has gotten a lot of attention recently. Wireless sensor networks' severe energy limits and demanding deployment circumstances make computer security more difficult than for traditional networks. In this era, WSNs are used to gather information. The information could be related to defense or military system, environmental condition, weather forecasting etc. As it is smaller in size so it can be easily used to gather information. But due to its smaller size it is less efficient if energy consumption is more. When consumption of energy increases, various attacks on WSNs are takes place such as Sinkhole attack, Wormhole attacks etc. To protect the WSNs LEACH (Low energy adaptive cluster head) protocol is used. In this essay, we'll contrast the effectiveness of the LEACH treatment with and without a SA. LEACH protocol is a type of hierarchical protocol which randomly selects the cluster head. This protocol always tries to equalize the energy consumption. Nodes which are previously become cluster head they cannot become a cluster head again in future. So each node which is not cluster is the closest cluster head and join that cluster. Those nodes which are not cluster they can exchange data by TDMA method. We can

(10)

observe that this protocol functions well while there is no assault on WSNs, but when there is a SA, the efficiency decreases since nodes need a lot of energy. 100 nodes in all were utilized for this. It has a unidirectional antenna. After doing 2500 cycles, the graphical summary is obtained. The first graph generated is data transmission v/s number of nodes. It shows that when number of rounds is performed, cluster head changes in each round. When sinkhole attack takes place the compromise node attract all the information which causes more emery consumption but without sinkhole attack it consume less energy and give efficient output. The second graph generated is energy consumption v/s number of nodes. If sinkhole attack takes place the consumption of energy is more and efficiency decreases. The third graph is count of CH head v/s number of nodes. It shows that in each round the cluster is created. For each cluster one cluster head is selected randomly. The fourth graph is alive node v/s number of nodes. This shows that in sinkhole attack when

efficiency of leach protocol decreases the node dies due to high consumption of energy. It depicts the alive node which is present at the last stage of round. By graphical representation we can analyze the efficiency of LEACH protocol in sinkhole attack and without sinkhole attack. Future mission applications would benefit greatly from the deployment of wireless sensor networks. If we look at previous study, we can see that a lot of effort is being performed on routing, i.e.

what is the best and most efficient path requires the nodes to be able to communicate with one another. Because the majority of wireless sensor networks are battery-powered, energy efficiency is one of the most significant factors. In order to create the wireless sensor network, the designer must select a routing protocol that consumes the least amount of resources. We examined the unique characteristics of wireless sensor networks in this research and discussed the difficulties in constructing compromised node detection systems.

Referensi

Dokumen terkait

The instruments are Student Social Support Scale by Nolten (1994) modified by Malecki and Elliott (1999) to measure the social support of parents and peers, The Three

كانه  نيتقيرط دادعلإ تاءاصحإ لوح عاطقلا ريغ يمسرلا : ةقيرطلا ةرشابملا ةلثمتملا يف زاجنإ حسم صاخ تادحول جاتنلاا يتلا طشنت يف عاطقلا ريغ ،يمسرلا فدهب فوقولا ىلع تازيمم صئاصخو