Abstract
Despite their popularity and widespread use, wireless sensor networks are vulnerable to different types of attacks due to their low energy consumption, simplicity and scalability constraints. This paper explores the possible network-layer attacks on WSN routing protocols. In addition, it proposes a comprehensive method for measuring the impact of network-layer attacks on WSNs. Moreover, it introduces a new network-layer attack – called “abandonment attack” – on one such WSN routing protocol, the low-energy adaptive clustering hierarchy protocol. Last, it measures the impact of the abandonment attack on the LEACH protocol. In the end, this paper finds that the abandonment attack increases the collision rate and the end-to-end delay on the LEACH protocol and decreases the network lifetime.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
The researchers used different names for the attacks in their study.
References
Heinzelman, W.: Application-specific protocol architectures for wireless networks. Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, Massachusetts, USA (2000)
Xie, H., Yan, Z., Yao, Z., Atiquzzaman, M.: Data collection for security measurement in wireless sensor networks: a survey. IEEE Internet Things J. 1(1), 1–22 (2018)
Alajmi, N.: Wireless sensor networks attacks and solutions. Int. J. Comput. Sci. Inf. Secur. 12(7), 37–40 (2014)
Pathan, A., Lee, H.-W., Hong, C.S.: Security in wireless sensor networks: issues and challenges. In: 2006 8th International Conference Advanced Communication Technology, Phoenix Park, South Korea, vol. 2, pp. 1046–1048. IEEE (2006). https://doi.org/10.1109/ICACT.2006.206151
Goyal, S., Bhatia T., Verma, A.: Wormhole and Sybil attack in WSN: a review. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, pp. 1463–1468. IEEE (2015)
Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications 2003, Anchorage, USA, pp. 113–127. IEEE (2003). https://doi.org/10.1109/SNPA.2003.1203362
Almomani, I., Al-Kasasbeh, B.: Performance analysis of LEACH protocol under Denial of service attacks. In: 2015 6th International Conference on Information and Communication Systems (ICICS), Amman, Jordan, pp. 292–297. IEEE (2015)
Ioannou, C., Vassiliou, V.: The impact of network layer attacks in wireless sensor networks. In: 2016 International Workshop on Secure Internet of Things (SIoT), Heraklion, Greece, pp. 20–28. IEEE (2016). https://doi.org/10.1109/SIoT.2016.009
Salam, M., Halemani, N.: Performance evaluation of wireless sensor network under hello flood attack. Int. J. Comput. Netw. Commun. (IJCNC) 8(2), 78–87 (2016)
Baskar, R., Raja, K., Joseph, C., Reji, M.: Sinkhole attack in wireless sensor networks—performance analysis and detection methods. Indian J. Sci. Technol. 10(12), 1–8 (2017)
µAMPS ns Code Extensions. http://www.mtl.mit.edu/researchgroups/icsystems/uamps/research/leach/leach_code.shtml. Accessed 06 May 2019
Heinzelman, W.R., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless microsensor networks. In: Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, Maui, HI, USA, pp. 1–10. IEEE (2000). https://doi.org/10.1109/HICSS.2000.926982
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Alhawas, A., Thomas, N. (2020). Abandonment Attack on the LEACH Protocol. In: Gribaudo, M., Iacono, M., Phung-Duc, T., Razumchik, R. (eds) Computer Performance Engineering. EPEW 2019. Lecture Notes in Computer Science(), vol 12039. Springer, Cham. https://doi.org/10.1007/978-3-030-44411-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-44411-2_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-44410-5
Online ISBN: 978-3-030-44411-2
eBook Packages: Computer ScienceComputer Science (R0)