Exploration of Detection Method of Clone Attack in Wireless Sensor Network

  • et al.
N/ACitations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Wireless sensor networks have a lot of sensor nodes that are small, cheap and resource-constraints, but are often used to perform various monitoring operations in unmanned and demanding environments. Networks are vulnerable to different application-based and application-independent attacks. We examine node replication attacks, which are typical threats in the sensor network. In this attack, the enemy generates its own sensor node using stealing sensor from network. The attacker physically occupies the node, takes his secret credentials, and duplicates a large number of nodes with some controlled counterparts. The defense against clone node attacks has become an important research element in the safety of the sensor network. In this study, we classify and examine the different proposals in each category. We also compare the memory and communication cost of different clone node detection approach.

Cite

CITATION STYLE

APA

Lalar*, S., Bhushan, S., & A.P., S. (2019). Exploration of Detection Method of Clone Attack in Wireless Sensor Network. International Journal of Recent Technology and Engineering (IJRTE), 8(4), 2440–2448. https://doi.org/10.35940/ijrte.d7192.118419

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free