Downloads: 121
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016
Improved Security and Avoid Clone Attack in Wireless Sensor Network
Kulwinder Singh [4] | Sheenam Malhotra [2]
Abstract: In the wireless sensor networks the network nodes are used for the sensing the information from the various types of non-reachable areas. Wireless sensor nodes has been used for the sensing the information from harsh environment. In these nodes sensors of different types has been used for collecting information. Main problem in this is to detect the node having clone attack, because each and every node has same id and locations at different position on same interval of time. This problem has also been arising in clusters in which clusters replicate and the main problem arises when cluster head replicate.
Keywords: Clustering, WSN, Leach protocol, Cluster heads
Edition: Volume 5 Issue 8, August 2016,
Pages: 862 - 866
Similar Articles with Keyword 'Clustering'
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Student Project, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 1875 - 1880Microclustering with Outlier Detection for DADC
Aswathy Priya M.
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023
Pages: 1840 - 1846Analysis of Placement for Electronics and Communication Engineering Students using Multiple Clustering
Dr. Dola Sanjay S