Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis

Wireless Sensor Network (WSN) are in great demand from the recent years, as nowadays we have seen a wide growth of wireless devices including cellular phones, laptops, mobiles, PDA’s etc. WSNs consists of thousands of tiny sensor nodes. In a WSN a node is no longer useful when its battery dies, so t...

Full description

Saved in:
Bibliographic Details
Main Author: Rita de Fátima Muniz
Format: Article
Language:English
Published: REA Press 2022-09-01
Series:Big Data and Computing Visions
Subjects:
Online Access:https://www.bidacv.com/article_160602_7a6e512dbc6976d9577e882440180580.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832579285509996544
author Rita de Fátima Muniz
author_facet Rita de Fátima Muniz
author_sort Rita de Fátima Muniz
collection DOAJ
description Wireless Sensor Network (WSN) are in great demand from the recent years, as nowadays we have seen a wide growth of wireless devices including cellular phones, laptops, mobiles, PDA’s etc. WSNs consists of thousands of tiny sensor nodes. In a WSN a node is no longer useful when its battery dies, so to avoid this problem many protocols were introduced, but most of the rank is given to hierarchical routing protocols. In this paper, we analyze LEACH protocol, its phases, advantages and disadvantages and various kinds of attacks on this routing protocol.
format Article
id doaj-art-16151ec46cbb45d4a0647bce4011c4ef
institution Kabale University
issn 2783-4956
2821-014X
language English
publishDate 2022-09-01
publisher REA Press
record_format Article
series Big Data and Computing Visions
spelling doaj-art-16151ec46cbb45d4a0647bce4011c4ef2025-01-30T12:22:16ZengREA PressBig Data and Computing Visions2783-49562821-014X2022-09-012311712110.22105/bdcv.2022.333760.1074160602Exploring the LEACH routing protocol in wireless sensor networks: a brief analysisRita de Fátima Muniz0Federal University of Ceará, Fortaleza, CE, Brazil.Wireless Sensor Network (WSN) are in great demand from the recent years, as nowadays we have seen a wide growth of wireless devices including cellular phones, laptops, mobiles, PDA’s etc. WSNs consists of thousands of tiny sensor nodes. In a WSN a node is no longer useful when its battery dies, so to avoid this problem many protocols were introduced, but most of the rank is given to hierarchical routing protocols. In this paper, we analyze LEACH protocol, its phases, advantages and disadvantages and various kinds of attacks on this routing protocol.https://www.bidacv.com/article_160602_7a6e512dbc6976d9577e882440180580.pdfwireless sensor networksleach protocolclustercluster headattacks
spellingShingle Rita de Fátima Muniz
Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis
Big Data and Computing Visions
wireless sensor networks
leach protocol
cluster
cluster head
attacks
title Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis
title_full Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis
title_fullStr Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis
title_full_unstemmed Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis
title_short Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis
title_sort exploring the leach routing protocol in wireless sensor networks a brief analysis
topic wireless sensor networks
leach protocol
cluster
cluster head
attacks
url https://www.bidacv.com/article_160602_7a6e512dbc6976d9577e882440180580.pdf
work_keys_str_mv AT ritadefatimamuniz exploringtheleachroutingprotocolinwirelesssensornetworksabriefanalysis