Loading

Exploration of Detection Method of Clone Attack in Wireless Sensor Network
Sachin Lalar1, Shashi Bhushan2, Surender3
1Sachin Lalar*, Ph.D. Research Scholar, CSE, IKGPTU, Kapurthala, India.
2Shashi Bhushan, Professor, I.T., CGC, Landran, Punjab, India.
3Surender, A.P., Computer Appl GTB, Bhawanigarh, India. 

Manuscript received on November 15, 2019. | Revised Manuscript received on November 23, 2019. | Manuscript published on November 30, 2019. | PP: 2440-2448 | Volume-8 Issue-4, November 2019. | Retrieval Number: D7192118419/2019©BEIESP | DOI: 10.35940/ijrte.D7192.118419

Open Access | Ethics and Policies | Cite  | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Wireless sensor networks have a lot of sensor nodes that are small, cheap and resource-constraints, but are often used to perform various monitoring operations in unmanned and demanding environments. Networks are vulnerable to different application-based and application-independent attacks. We examine node replication attacks, which are typical threats in the sensor network. In this attack, the enemy generates its own sensor node using stealing sensor from network. The attacker physically occupies the node, takes his secret credentials, and duplicates a large number of nodes with some controlled counterparts. The defense against clone node attacks has become an important research element in the safety of the sensor network. In this study, we classify and examine the different proposals in each category. We also compare the memory and communication cost of different clone node detection approach.
Keywords: Wireless Sensor Network, Attacks, Clone Node Attack, Memory Cost, Communication Cost.
Scope of the Article: Energy Harvesting and Transfer for Wireless Sensor Networks.