International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 121 | Views: 195

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016 | Rating: 6.1 / 10


Improved Security and Avoid Clone Attack in Wireless Sensor Network

Kulwinder Singh, Sheenam Malhotra


Abstract: In the wireless sensor networks the network nodes are used for the sensing the information from the various types of non-reachable areas. Wireless sensor nodes has been used for the sensing the information from harsh environment. In these nodes sensors of different types has been used for collecting information. Main problem in this is to detect the node having clone attack, because each and every node has same id and locations at different position on same interval of time. This problem has also been arising in clusters in which clusters replicate and the main problem arises when cluster head replicate.


Keywords: Clustering, WSN, Leach protocol, Cluster heads


Edition: Volume 5 Issue 8, August 2016


Pages: 862 - 866



How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top