
Exploration of Detection Method of Clone Attack in Wireless Sensor Network
Author(s) -
Sachin Lalar*,
Shashi Bhushan,
Surender A.P.
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.d7192.118419
Subject(s) - wireless sensor network , node (physics) , computer science , computer network , adversary , key distribution in wireless sensor networks , replication (statistics) , sensor node , clone (java method) , computer security , wireless , wireless network , engineering , telecommunications , dna , statistics , mathematics , structural engineering , biology , genetics
Wireless sensor networks have a lot of sensor nodes that are small, cheap and resource-constraints, but are often used to perform various monitoring operations in unmanned and demanding environments. Networks are vulnerable to different application-based and application-independent attacks. We examine node replication attacks, which are typical threats in the sensor network. In this attack, the enemy generates its own sensor node using stealing sensor from network. The attacker physically occupies the node, takes his secret credentials, and duplicates a large number of nodes with some controlled counterparts. The defense against clone node attacks has become an important research element in the safety of the sensor network. In this study, we classify and examine the different proposals in each category. We also compare the memory and communication cost of different clone node detection approach.