International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Since Year 2012 | Open Access | Double Blind Reviewed

ISSN: 2319-7064




Downloads: 121

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016


Improved Security and Avoid Clone Attack in Wireless Sensor Network

Kulwinder Singh [4] | Sheenam Malhotra [2]


Abstract: In the wireless sensor networks the network nodes are used for the sensing the information from the various types of non-reachable areas. Wireless sensor nodes has been used for the sensing the information from harsh environment. In these nodes sensors of different types has been used for collecting information. Main problem in this is to detect the node having clone attack, because each and every node has same id and locations at different position on same interval of time. This problem has also been arising in clusters in which clusters replicate and the main problem arises when cluster head replicate.


Keywords: Clustering, WSN, Leach protocol, Cluster heads


Edition: Volume 5 Issue 8, August 2016,


Pages: 862 - 866


How to Cite this Article?

Kulwinder Singh, Sheenam Malhotra, "Improved Security and Avoid Clone Attack in Wireless Sensor Network", International Journal of Science and Research (IJSR), Volume 5 Issue 8, August 2016, pp. 862-866, https://www.ijsr.net/get_abstract.php?paper_id=ART2016519

How to Share this Article?






Similar Articles with Keyword 'Clustering'

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 1875 - 1880

Microclustering with Outlier Detection for DADC

Aswathy Priya M.

Share this Article

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 649 - 652

Image Segmentation using Biogeography based Optimization and its Comparison with K Means Clustering

Babita Chauhan [2] | Preeti Sondhi [7]

Share this Article


Top