Abstract
The Internet of Things (IoT) is a swiftly evolving technology that will have a significant impact in the future. The Internet of Things (IoT) is a huge collection of interconnected networks, such as the Wireless Sensor Network (WSN), that make use of fast evolving devices and technologies. The risk of confidentiality of information and protection has increased as a result of the indefinite interconnection of a variety of applied sciences in IoT. WSN employs Low Energy Adaptive Clustering Hierarchy (LEACH) to create an energy-efficacious network that is vulnerable to a wide range of assaults, including the HELLO flood. This work employs AS-LEACH (Abundant Secure LEACH) as an extension to the LEACH protocol to protect cluster heads from Hello flood attacks. For the purpose of validating a sensor node as CH, AS-LEACH employs RBG color cube numbers, a distinct Abundant number, and each sensor node has its own unique ID. The NS2 network simulator is utilized to implement AS-LEACH and verify its efficiency in this proposed work.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Computer Science and Mobile Computing
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.