International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 115 | Views: 182

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 5, May 2015


Review on Detection of Clone Attacks inWireless Sensor Networks

Nikita R. Kitey | Dr. M. S. Ali [2]


Abstract: Wireless Sensor networks (WSN) is an emerging technology and have great potential to be employed in critical situations like battlefields and commercial applications such as building, traffic surveillance, habitat monitoring and smart homes and many more scenarios. Wireless sensor networks are often deployed in hostile environments, where an adversary can physically capture some of the nodes. Once a node is captured, the attacker can re-program it and replicate the node in a large number of clones, thus easily taking over the network. The detection of node replication attacks in a wireless sensor network is therefore a fundamental problem. A few distributed solutions have recently been analyzed. Here we propose two novel node clone detection protocols with different tradeoffs on network conditions and performance. The rst one is based on a distributed hash table (DHT), by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes effectively. Our second distributed detection protocol, named randomly directed exploration. It presents good communication performance for dense sensor networks, by a probabilistic directed forwarding technique along with random initial direction and border determination.


Keywords: Wireless sensor networks, clone, distributed detection, DHT- Distributed hash table, Randomly directed exploration


Edition: Volume 4 Issue 5, May 2015,


Pages: 1000 - 1004


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top