Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Detection of Clone Attacks in WSNs-A Survey


Affiliations
1 CSE Department, RMK Engineering College, India
2 IT Department, Velammal Engineering College, India
     

   Subscribe/Renew Journal


A wireless sensor network is a collection of nodes organized in to a cooperative network. This network is prone to various attacks due to poor security. One of the attacks is clone attack in which an adversary captures some nodes and replicates them including the cryptographic in formation and deploys them in the network. This attack is very dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of the network. Several algorithms are developed to detect clone attacks, in static WSNs and mobile WSNs. Each one has its own advantages and disadvantages. This paper surveys these algorithms and compares their performance based on parameters like communication cost and memory.

Keywords

Attacks, Clone Attack, Sensor Network, Witness Node.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 207

PDF Views: 3




  • Detection of Clone Attacks in WSNs-A Survey

Abstract Views: 207  |  PDF Views: 3

Authors

C. Geetha
CSE Department, RMK Engineering College, India
M. Ramakrishnan
IT Department, Velammal Engineering College, India

Abstract


A wireless sensor network is a collection of nodes organized in to a cooperative network. This network is prone to various attacks due to poor security. One of the attacks is clone attack in which an adversary captures some nodes and replicates them including the cryptographic in formation and deploys them in the network. This attack is very dangerous because they allow the attacker to leverage the compromise of a few nodes to exert control over much of the network. Several algorithms are developed to detect clone attacks, in static WSNs and mobile WSNs. Each one has its own advantages and disadvantages. This paper surveys these algorithms and compares their performance based on parameters like communication cost and memory.

Keywords


Attacks, Clone Attack, Sensor Network, Witness Node.