Open Access Open Access  Restricted Access Subscription Access

Analysis of Clone Detection Approaches in Static Wireless Sensor Networks


Affiliations
1 CSE, IKGPTU, Kapurthala, India
2 CGC, Landran, Punjab, India
3 A.P., Computer Appl. GTB, Bhawanigarh, India
 

Wireless Sensor Networks (WSNs) are developing very fast in the wireless networks. The wireless sensor network has the characteristics of limited memory, small size and limited battery. WSNs are vulnerable to the different types of attacks due to its characteristics. One of the attacks is clone node attack in which attacker capture the nodes from the network and stoles the information from it and replicates it in the network. From the clone nodes, the attacker can easily launch the different type of attacks in the network. To detect the clone node, different methods has been implemented .Each method having advantages and limitations. In the this paper, we explain the different methods to detect the clone nodes in the static wireless sensor network and compare their performance based on the communication cost and memory.

Keywords

WSN, Clone Attack, Clone Attack Detection, Centralized Approach, Distributed Approach.
User
Notifications
Font Size


  • Analysis of Clone Detection Approaches in Static Wireless Sensor Networks

Abstract Views: 498  |  PDF Views: 0

Authors

Sachin Lalar
CSE, IKGPTU, Kapurthala, India
Shashi Bhushan
CGC, Landran, Punjab, India
Surender
A.P., Computer Appl. GTB, Bhawanigarh, India

Abstract


Wireless Sensor Networks (WSNs) are developing very fast in the wireless networks. The wireless sensor network has the characteristics of limited memory, small size and limited battery. WSNs are vulnerable to the different types of attacks due to its characteristics. One of the attacks is clone node attack in which attacker capture the nodes from the network and stoles the information from it and replicates it in the network. From the clone nodes, the attacker can easily launch the different type of attacks in the network. To detect the clone node, different methods has been implemented .Each method having advantages and limitations. In the this paper, we explain the different methods to detect the clone nodes in the static wireless sensor network and compare their performance based on the communication cost and memory.

Keywords


WSN, Clone Attack, Clone Attack Detection, Centralized Approach, Distributed Approach.

References





DOI: https://doi.org/10.13005/ojcst%2F10.03.14