Downloads: 132
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016
Detection and Avoidance of Clone Attack in WSN Using Neighbor Witness Node
Ghansham Dass | Rishideep Singh
Abstract: Wireless sensor nodes has been used for the sensing the information from harsh environment. Wireless sensor networks are of main two types, which are static wireless sensor nodes and mobility wireless sensor networks. In MWSNs the main threat in the network is security. Various types of attacks occurred in these networks. A clone node can create a black hole or wormhole attack include adversary can use them in different ways. This attack can transmit false information to all legitimate nodes. The clone attack is very suitable for adversary. For this attack adversary has not to be compromise for number of nodes. The adversary can do cloning of one node and can predict other nodes through this node. It falsifies its positions at different times at different locations. Main problem in this is to detect the node having clone attack, because each and every node has same id and locations at different position on same interval of time. This problem has also been arising in clusters in which clusters replicate and the main problem arises when cluster head replicate. In purposed work LEACH protocol will be used for clustering.
Keywords: Wireless Sensor Network, LEACH, Clone Attack, Clustering, Replication Attack
Edition: Volume 5 Issue 1, January 2016,
Pages: 424 - 428
Similar Articles with Keyword 'Wireless Sensor Network'
Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri | S. K. Srivatsa [4]
Downloads: 1
Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021
Pages: 475 - 485Light Weight WSN Authentication Protocol Suite
Rahul K Drolia