International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 115

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015


Review on Detection of Clone Attacks inWireless Sensor Networks

Nikita R. Kitey | Dr. M. S. Ali [2]


Abstract: Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. Wireless sensor networks are often deployed in hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, the attacker can re-program it and replicate the node in a large number of clones, thus easily taking over the network. The detection of node replication attacks in a wireless sensor network is therefore a fundamental problem. A few distributed solutions have recently been analyzed. Here we propose two novel node clone detection protocols with different tradeoffs on network conditions and performance. The rst one is based on a distributed hash table (DHT), by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. Our second distributed detection protocol, named randomly directed exploration. It presents good communication performance for dense sensor networks, by a probabilistic directed forwarding technique along with random initial direction and border determination.


Keywords: Wireless sensor networks, clone, distributed detection, DHT- Distributed hash table, Randomly directed exploration


Edition: Volume 4 Issue 5, May 2015,


Pages: 1000 - 1004


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Nikita R. Kitey, Dr. M. S. Ali, "Review on Detection of Clone Attacks inWireless Sensor Networks", International Journal of Science and Research (IJSR), Volume 4 Issue 5, May 2015, pp. 1000-1004, https://www.ijsr.net/get_abstract.php?paper_id=SUB154273

Similar Articles with Keyword 'Wireless sensor networks'

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri | S. K. Srivatsa [4]

Share this Article

Downloads: 1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 5, May 2021

Pages: 475 - 485

Light Weight WSN Authentication Protocol Suite

Rahul K Drolia

Share this Article
Top