logo

Assignment on Security in Computing and IT

   

Added on  2022-08-30

12 Pages2701 Words15 Views
Running head: Security in Computing and IT
Wireless Networks protocols and Security
Name of the Student
Name of the University
Authors note

SECURITY IN COMPUTING AND IT
1
Table of Contents
Introduction......................................................................................................................................2
Part A...............................................................................................................................................2
Routing Mechanisms.......................................................................................................2
Reduced energy consumption..........................................................................................3
Advantages and limitations..............................................................................................3
Part B...............................................................................................................................................5
Security issues of the routing protocols...........................................................................5
Attacks on the routing protocols......................................................................................5
Countermeasure for the attacks.......................................................................................7
Comparative analysis on performance of the routing protocols......................................8
Conclusion.......................................................................................................................................9
References......................................................................................................................................10

SECURITY IN COMPUTING AND IT
2
Introduction
In case of wireless sensor networks there are numerous nodes are deployed within a
network that depends on a specific protocol to operate and collect information from surrounding
area or nodes [8]. All these gathered data are transmitted to some specific base station in that will
process it and present at the edge of network. It Acts as the gateway to sensor networks as well
as external environment. In the different sections of this report different aspects of PEGASIS and
LEACH protocol is discussed in brief.
Part A
Routing Mechanisms
LEACH: In wireless sensor networks the LEACH is considered as adaptive and self-
organizing protocol that depends on the cluster mechanism. In this protocol the sensor nodes
organize themselves and divides some finite number of nodes in local clusters. After this a
cluster head is determined by the cluster members [6]. It is done in order to reduce the energy
consumption by the individual nodes as well as minimize the data aggregation process which
consequently reduces the number of messages that are delivered to ultimately to base station.
This in turn increases lifetime of the wireless sensor network.
PEGASIS: In Power Efficient Gathering in Sensor Information Systems or PEGASIS
each node in the network communicates with the closest neighbor nodes. After this the selected
node takes turn in order to transmit the received data to finally to the base station [1]. In this way
it becomes easy to reduce the required amount of energy for every round of data transmission.

SECURITY IN COMPUTING AND IT
3
Using greedy algorithm, the nodes are organized to form a chain, after that base station
can compute this chain and broadcast it to all the sensor nodes. The PEGASIS saves energy at
multiple stages and thus considered as efficient compared to the LEACH.
Reduced energy consumption
For LEACH as the in a certain cluster inside the network the CH or Cluster head collects
data that needs to be transmitted from cluster members thus the required energy for transmission
is reduced. Furthermore, in order to reduce different inter-cluster or intra-cluster message
collisions this protocol depends on the TDMA as well as CDMA (code-division multiple access)
access mechanism [3]. In this protocol the decision about elevating any node as the cluster head
is dynamic and carried out in time interval. In the similar manner the data collection from the
node is also performed periodically that in turn reduces the energy required for redundant data
transmission.
In case of PEGASIS in the first stage of local data gathering compared to the LEACH
the distances between the cluster head and ordinary nodes as well as to the base station can be
longer that requires extra amount of energy in LEACH but transmitting to the closest node
reduces the requirement of the energy to different cluster heads [4]. Furthermore, as only
single node transmits data to base station after a round compared to multiple Cluster heads
leading to energy efficiency.
Advantages and limitations
Advantages and limitations of LEACH
1.As the LEACH depends on the cluster model and Cluster Heads are responsible for
aggregation of the complete data from the nodes thus helpful in reducing the network traffic.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireless Networks Protocols and Security - Assignment
|12
|2482
|16

PEGASIS Assignment: Part B
|9
|2318
|22

Computer Networking and Application Research Paper 2022
|11
|2650
|22

Comparative Study of PEGASIS Protocols
|8
|1360
|13

Wireless Routing Protocols and Security Analysis
|15
|2815
|21

Wireless Networks & Communication INTRODUCTION
|7
|1967
|200