Abstract: Clone Attack Detection in MWSN Using Neighbor Node Information
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 113

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 2, February 2016

Clone Attack Detection in MWSN Using Neighbor Node Information

Ashe Kiran, Deepinder Dhaliwal

Various types of attacks occurred in WSN network. Attack occur in WSN is clone attack which is also known as replica attack. In this attack the node copy the id of the other node and show its predictions at different locations. A clone node can create a black hole or wormhole attack include adversary can use them in different ways. This attack can transmit false information to all legitimate nodes. The clone attack is very suitable for adversary. For this attack adversary has not to be compromise for number of nodes. The adversary can do cloning of one node and can predict other nodes through this node. It falsifies its positions at different times at different locations. Main problem in this is to detect the node having clone attack, because each and every node has same id and locations at different position on same interval of time. This problem has also been arising in clusters in which clusters replicate and the main problem arises when cluster head replicate.

Keywords: WSN, MWSN, Replication Attack, Leach, Clustering

Edition: Volume 5 Issue 2, February 2016

Pages: 1956 - 1959

Share this Article

How to Cite this Article?

Ashe Kiran, Deepinder Dhaliwal, "Clone Attack Detection in MWSN Using Neighbor Node Information", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV161428, Volume 5 Issue 2, February 2016, 1956 - 1959

Enter Your Email Address


Similar Articles with Keyword 'WSN'

Downloads: 155 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article

Similar Articles with Keyword 'MWSN'

Downloads: 117

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 4, April 2017

Pages: 1657 - 1661

A Comparative Surveyon Various Routing Protocols for Mobile Sink in WSN

Amit Kumar, Abhijeet Das

Share this Article

Downloads: 124

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 1, January 2017

Pages: 1120 - 1125

Enhanced The Routing Efficiency of Wireless Sensor Network Using STR Protocol and Node Reference Process

Vasudha Rani Patel, Sapna Singh

Share this Article

Similar Articles with Keyword 'Replication Attack'

Downloads: 112

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1419 - 1424

Detection of Node Replication Attack in MSN Based On PKI

Hemlata B Kadam, Rahul Kulkarni

Share this Article

Downloads: 112

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 1499 - 1503

Enhanced Distributed Detection Protocol for Node Replication Attack

Aiswaria E S

Share this Article

Similar Articles with Keyword 'Leach'

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 991 - 996

Review on Various Data Gathering Techniques Using Artificial Intelligence

Varsha Kumari, Preeti Sondhi

Share this Article

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 345 - 348

Comparison of Data Gathering Techniques Using Artificial Intelligence

Varsha Kumari, Preeti Sondhi

Share this Article

Similar Articles with Keyword 'Clustering'

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 649 - 652

Image Segmentation using Biogeography based Optimization and its Comparison with K Means Clustering

Babita Chauhan, Preeti Sondhi

Share this Article

Downloads: 1

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 948 - 951

Survey on Various Image Segmentation Techniques

Babita Chauhan

Share this Article
Top