Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis
Wireless Sensor Network (WSN) are in great demand from the recent years, as nowadays we have seen a wide growth of wireless devices including cellular phones, laptops, mobiles, PDA’s etc. WSNs consists of thousands of tiny sensor nodes. In a WSN a node is no longer useful when its battery dies, so t...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
REA Press
2022-09-01
|
Series: | Big Data and Computing Visions |
Subjects: | |
Online Access: | https://www.bidacv.com/article_160602_7a6e512dbc6976d9577e882440180580.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832579285509996544 |
---|---|
author | Rita de Fátima Muniz |
author_facet | Rita de Fátima Muniz |
author_sort | Rita de Fátima Muniz |
collection | DOAJ |
description | Wireless Sensor Network (WSN) are in great demand from the recent years, as nowadays we have seen a wide growth of wireless devices including cellular phones, laptops, mobiles, PDA’s etc. WSNs consists of thousands of tiny sensor nodes. In a WSN a node is no longer useful when its battery dies, so to avoid this problem many protocols were introduced, but most of the rank is given to hierarchical routing protocols. In this paper, we analyze LEACH protocol, its phases, advantages and disadvantages and various kinds of attacks on this routing protocol. |
format | Article |
id | doaj-art-16151ec46cbb45d4a0647bce4011c4ef |
institution | Kabale University |
issn | 2783-4956 2821-014X |
language | English |
publishDate | 2022-09-01 |
publisher | REA Press |
record_format | Article |
series | Big Data and Computing Visions |
spelling | doaj-art-16151ec46cbb45d4a0647bce4011c4ef2025-01-30T12:22:16ZengREA PressBig Data and Computing Visions2783-49562821-014X2022-09-012311712110.22105/bdcv.2022.333760.1074160602Exploring the LEACH routing protocol in wireless sensor networks: a brief analysisRita de Fátima Muniz0Federal University of Ceará, Fortaleza, CE, Brazil.Wireless Sensor Network (WSN) are in great demand from the recent years, as nowadays we have seen a wide growth of wireless devices including cellular phones, laptops, mobiles, PDA’s etc. WSNs consists of thousands of tiny sensor nodes. In a WSN a node is no longer useful when its battery dies, so to avoid this problem many protocols were introduced, but most of the rank is given to hierarchical routing protocols. In this paper, we analyze LEACH protocol, its phases, advantages and disadvantages and various kinds of attacks on this routing protocol.https://www.bidacv.com/article_160602_7a6e512dbc6976d9577e882440180580.pdfwireless sensor networksleach protocolclustercluster headattacks |
spellingShingle | Rita de Fátima Muniz Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis Big Data and Computing Visions wireless sensor networks leach protocol cluster cluster head attacks |
title | Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis |
title_full | Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis |
title_fullStr | Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis |
title_full_unstemmed | Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis |
title_short | Exploring the LEACH routing protocol in wireless sensor networks: a brief analysis |
title_sort | exploring the leach routing protocol in wireless sensor networks a brief analysis |
topic | wireless sensor networks leach protocol cluster cluster head attacks |
url | https://www.bidacv.com/article_160602_7a6e512dbc6976d9577e882440180580.pdf |
work_keys_str_mv | AT ritadefatimamuniz exploringtheleachroutingprotocolinwirelesssensornetworksabriefanalysis |