Wireless sensor networks have a lot of sensor nodes that are small, cheap and resource-constraints, but are often used to perform various monitoring operations in unmanned and demanding environments. Networks are vulnerable to different application-based and application-independent attacks. We examine node replication attacks, which are typical threats in the sensor network. In this attack, the enemy generates its own sensor node using stealing sensor from network. The attacker physically occupies the node, takes his secret credentials, and duplicates a large number of nodes with some controlled counterparts. The defense against clone node attacks has become an important research element in the safety of the sensor network. In this study, we classify and examine the different proposals in each category. We also compare the memory and communication cost of different clone node detection approach.
CITATION STYLE
Lalar*, S., Bhushan, S., & A.P., S. (2019). Exploration of Detection Method of Clone Attack in Wireless Sensor Network. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 2440–2448. https://doi.org/10.35940/ijrte.d7192.118419
Mendeley helps you to discover research relevant for your work.