Skip to main content

Abandonment Attack on the LEACH Protocol

  • Conference paper
  • First Online:
  • 265 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 12039))

Abstract

Despite their popularity and widespread use, wireless sensor networks are vulnerable to different types of attacks due to their low energy consumption, simplicity and scalability constraints. This paper explores the possible network-layer attacks on WSN routing protocols. In addition, it proposes a comprehensive method for measuring the impact of network-layer attacks on WSNs. Moreover, it introduces a new network-layer attack – called “abandonment attack” – on one such WSN routing protocol, the low-energy adaptive clustering hierarchy protocol. Last, it measures the impact of the abandonment attack on the LEACH protocol. In the end, this paper finds that the abandonment attack increases the collision rate and the end-to-end delay on the LEACH protocol and decreases the network lifetime.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    The researchers used different names for the attacks in their study.

References

  1. Heinzelman, W.: Application-specific protocol architectures for wireless networks. Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, Massachusetts, USA (2000)

    Google Scholar 

  2. Xie, H., Yan, Z., Yao, Z., Atiquzzaman, M.: Data collection for security measurement in wireless sensor networks: a survey. IEEE Internet Things J. 1(1), 1–22 (2018)

    Article  Google Scholar 

  3. Alajmi, N.: Wireless sensor networks attacks and solutions. Int. J. Comput. Sci. Inf. Secur. 12(7), 37–40 (2014)

    Google Scholar 

  4. Pathan, A., Lee, H.-W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. In: 2006 8th International Conference Advanced Communication Technology, Phoenix Park, South Korea, vol. 2, pp. 1046–1048. IEEE (2006). https://doi.org/10.1109/ICACT.2006.206151

  5. Goyal, S., Bhatia T., Verma, A.: Wormhole and Sybil attack in WSN: a review. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, pp. 1463–1468. IEEE (2015)

    Google Scholar 

  6. Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications 2003, Anchorage, USA, pp. 113–127. IEEE (2003). https://doi.org/10.1109/SNPA.2003.1203362

  7. Almomani, I., Al-Kasasbeh, B.: Performance analysis of LEACH protocol under Denial of service attacks. In: 2015 6th International Conference on Information and Communication Systems (ICICS), Amman, Jordan, pp. 292–297. IEEE (2015)

    Google Scholar 

  8. Ioannou, C., Vassiliou, V.: The impact of network layer attacks in wireless sensor networks. In: 2016 International Workshop on Secure Internet of Things (SIoT), Heraklion, Greece, pp. 20–28. IEEE (2016). https://doi.org/10.1109/SIoT.2016.009

  9. Salam, M., Halemani, N.: Performance evaluation of wireless sensor network under hello flood attack. Int. J. Comput. Netw. Commun. (IJCNC) 8(2), 78–87 (2016)

    Google Scholar 

  10. Baskar, R., Raja, K., Joseph, C., Reji, M.: Sinkhole attack in wireless sensor networks—performance analysis and detection methods. Indian J. Sci. Technol. 10(12), 1–8 (2017)

    Article  Google Scholar 

  11. µAMPS ns Code Extensions. http://www.mtl.mit.edu/researchgroups/icsystems/uamps/research/leach/leach_code.shtml. Accessed 06 May 2019

  12. Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, pp. 1–10. IEEE (2000). https://doi.org/10.1109/HICSS.2000.926982

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Albatool Alhawas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alhawas, A., Thomas, N. (2020). Abandonment Attack on the LEACH Protocol. In: Gribaudo, M., Iacono, M., Phung-Duc, T., Razumchik, R. (eds) Computer Performance Engineering. EPEW 2019. Lecture Notes in Computer Science(), vol 12039. Springer, Cham. https://doi.org/10.1007/978-3-030-44411-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-44411-2_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-44410-5

  • Online ISBN: 978-3-030-44411-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics