Abstract
In unattended areas, the wireless sensor network is deployed and the nodes are always open to attacks. An adversary can capture a node and can deploy many nodes, which are clone of the captured, in the network called clone node or replicated node by using the credential information retrieved from captured node. These clone nodes can damage the network directly or indirectly. This attack is called node replication o attack or clone node attack. In this area, so many works are introduced and all of these methods use a random key or code, or location information, to detect clone nodes. This paper presents a method that does not use any of this information. The simulation results show that it performs better than previous methods.
Cite
CITATION STYLE
M, S., Kavitha, D., & Reddy, P. C. (2022). Clone Node Detection in Heterogeneous WSN with Low Memory Overhead. International Journal of Recent Technology and Engineering (IJRTE), 11(3), 21–26. https://doi.org/10.35940/ijrte.c7206.0911322
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.