International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 113 | Views: 182

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 2, February 2016


Clone Attack Detection in MWSN Using Neighbor Node Information

Ashe Kiran [2] | Deepinder Dhaliwal [2]


Abstract: Various types of attacks occurred in WSN network. Attack occur in WSN is clone attack which is also known as replica attack. In this attack the node copy the id of the other node and show its predictions at different locations. A clone node can create a black hole or wormhole attack include adversary can use them in different ways. This attack can transmit false information to all legitimate nodes. The clone attack is very suitable for adversary. For this attack adversary has not to be compromise for number of nodes. The adversary can do cloning of one node and can predict other nodes through this node. It falsifies its positions at different times at different locations. Main problem in this is to detect the node having clone attack, because each and every node has same id and locations at different position on same interval of time. This problem has also been arising in clusters in which clusters replicate and the main problem arises when cluster head replicate.


Keywords: WSN, MWSN, Replication Attack, Leach, Clustering


Edition: Volume 5 Issue 2, February 2016,


Pages: 1956 - 1959


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top