Clone Node Detection in Heterogeneous WSN with Low Memory Overhead

  • et al.
N/ACitations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In unattended areas, the wireless sensor network is deployed and the nodes are always open to attacks. An adversary can capture a node and can deploy many nodes, which are clone of the captured, in the network called clone node or replicated node by using the credential information retrieved from captured node. These clone nodes can damage the network directly or indirectly. This attack is called node replication o attack or clone node attack. In this area, so many works are introduced and all of these methods use a random key or code, or location information, to detect clone nodes. This paper presents a method that does not use any of this information. The simulation results show that it performs better than previous methods.

Cite

CITATION STYLE

APA

M, S., Kavitha, D., & Reddy, P. C. (2022). Clone Node Detection in Heterogeneous WSN with Low Memory Overhead. International Journal of Recent Technology and Engineering (IJRTE), 11(3), 21–26. https://doi.org/10.35940/ijrte.c7206.0911322

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free