Academic Journals Database
Disseminating quality controlled scientific knowledge

Security In Wireless Sensor Networks - Improving The LEAP Protocol

Author(s): Delan Alsoufi | Khaled Elleithy | Tariq Abuzaghleh | Ahmad Nassar

Journal: International Journal of Computer Science and Engineering Survey
ISSN 0976-3252

Volume: 3;
Issue: 3;
Start page: 1;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Network Protocols | Wireless Sensor Network (WSN) | LEAP protocol | Security | compromised nodes

Wireless sensor networks are becoming significantly vital to many applications, and they were initially used by the military for surveillance purposes. One of the biggest concerns of WSNs is that they are very defenceless to security threats. Due to the fact that these networks are susceptible to hackers; it ispossible for one to enter and render a network. For example, such networks may be hacked into in the military, using the system to attack friendly forces. Leap protocol offers many security benefits to WSNs. However, with much research it became apparent that LEAP only employs one base station and always assumes that it is trustworthy. It does not consist of defence against hacked or compromised base stations. In this paper, intensive research was undertaken on LEAP protocols, finding out its security drawbacks and limitations. A solution has been proposed inorder to overcome the security issues faced in implementing this protocol whilst employing more than one base station. The performance of the proposed solution has been evaluated and simulated to provide a better network performance.
RPA Switzerland

RPA Switzerland

Robotic process automation


Tango Rapperswil
Tango Rapperswil