Subscribe/Renew Journal
Wireless Sensor Network (WSN) is a combination of autonomous sensor nodes and used to monitor various physical conditions. Static and mobile are two types of WSN. In static WSN the sensor nodes do not alter their positions after deployment. Due to the security constraints, WSN is vulnerable to various types of attacks. In that, Clone attack is the most dangerous attack on WSN. In Clone attack an adversary physically captures a sensor node. It reprograms the detained node and generates many clone nodes. The real nodes and clone nodes are installed in the sensor field, so clone node identification is a difficult task. The new protocol proposed to identify the clone nodes in the static WSN called as Node Based Clone Attack Detection (NBCAD) protocol. This protocol detects the clones in a efficient manner compare with SET and RED protocols. The advantage of proposed NBCAD protocol include high clone detection ratio, minimum communication overhead, minimum end-to-end delay, minimum latency time and high throughput.
Subscription
Login to verify subscription
User
Font Size
Information