The aim of this review paper is to study the security of Leach protocol used in wireless sensor network. It includes various attacks possible on Leach protocol and methods to prevent it from attacks. Leach is low energy adaptive clustering (CH) hierarchical protocol which is a highly secure protocol still there are attacks possible on Leach. The wireless sensor network is more prone to attacks than wired network. Also there are energy issues and security issues arise in wireless sensor network. To resolve that issues various routing protocols have been proposed. Leach is one of the hierarchical routing protocols. For security of WSN various security mechanisms are also studied in this paper.
P. Vasan and M. Behniwal, “Secure and Reliable Data Transmission Using Homomorphic Encryption in WSN”, in international journal of Advanced research in computer science and software engg, May 2014.
K. V. Shukla, “Research On Energy Efficient Routing Protocol LEACH For Wireless Sensor Networks” in International Journal of Engineering Research & Technology, March, 2013.
A. Gupta and V. Sharma, “A Confidentiality Scheme for Energy Efficient LEACH Protocol Using Homomorphic Encryption” in International Journal of Advanced Research in Computer Science and Software Engineering, may 2013.
S. Ghildiyal, A. Gupta, M. Vaqur, A.Semwal, “Analysis of wireless sensor networks: Security, Attacks and Challenges” in International Journal of Research in Engineering and Technology , march 2014.
H. Sun, C. Chen and Y. Hsiao, “An efficient countermeasure to the selective forwarding attack in wireless sensor networks,” in Proc. Of IEEE TENCON 2007, Oct. 2007, pp. 1-4.
V. Soni, P. Modi, V. Chaudhri , “Detecting Sinkhole Attack in Wireless Sensor Network” in International Journal of Application or Innovation in Engineering & Management ,feb 2013.
S. Iqbal, A.Srinivas S P, S.S Kashyap, “Comparison of different attacks on Leachprotocolin WSN” in Proceedings of ASAR International Conference, 14th May-2014, Mysore, India.
K. Zhang, C. Wang and C. Wang, “A secure routing protocol for cluster-based wireless sensor networks using group key management,” in Proc. 4th IEEE International conference on Wireless communications, Networking and Mobile Computing, 2008, pp. 1-5.
D.Wu, G. Hu, and G. Ni, “Research and improve onsecure routing protocols in wireless sensor networks”,Fourth IEEE International Conference on Circuits andSystems for Communications (ICCSC), pp. 853–856,Shanghai, May 2008.
P. Maidamwar& N.Chavan, “Impact of warmhole attack on performance of Leach in wireless sensor networks ” in International Journal of Computer networking, Aug 2013.
J. R. Douceur, “The Sybil Attack,”in 1st international workshop on peer to peer systems, 2002.
C. karlof, D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures, IEEE, 2003.
K. Zhang and C. Wang, “A Secure routing protocol for cluster-based wireless sensor networks using group key management,” in Proc. 4th IEEE.
L. B. Oliveira, A. Ferreira, M. A. Vilaca, H.C. Wong, M. Bern, R. Dahab, and A. A. F. Loureiro, “Secleach-on the security of clustered sensor networks”, Signal Processing, 87(12):2882-2895, December 2007.
J. Chen, H. Zhang, and J. Hu, “An efficiency security model of routing protocol in wireless sensor networks”, In Proceedings of the 2nd Asia International Conference on Modeling and Simulation, 2008, pages 59-64, Washington, DC, USA, 2008, IEEE Computer Society.
L. B. Olivera, H. C. Wong, M. Bern, R. Dahab, and A. A. F. Loureiro, “Secleach- a random key distribution solution for securing clustered sensor networks”, In Proceeding of the 5th IEEE International Symposium on Network Computing and Applications, pages 145-154, Washington, DC, USA, 2006, IEEE Computer Society.
V. Pal Singh, A. S. AnandUkey, S. Jain, “Signal Strength based Hello Flood Attack Detection and Prevention in Wireless Sensor Networks” in International Journal of Computer Applications, Jan 2013.
S.KaurSaini and M. Gupta, “Detection of Malicious Cluster Head causing Hello Flood Attack in LEACH Protocol in Wireless Sensor Networks” in International Journal of Application or Innovation in Engineering & Management, May 2014.
S. Magotra, K Kumar , \"Detection of HELLO flood attack on LEACH protocol,\" Advance Computing Conference(IACC), 2014 IEEE International , vol., no., pp.193,198, 21-22 Feb. 2014.
WSN, CH, Leach, adversary.