Downloads: 121 | Views: 258
Research Paper | Computer Science & Engineering | India | Volume 5 Issue 8, August 2016 | Popularity: 6.1 / 10
Improved Security and Avoid Clone Attack in Wireless Sensor Network
Kulwinder Singh, Sheenam Malhotra
Abstract: In the wireless sensor networks the network nodes are used for the sensing the information from the various types of non-reachable areas. Wireless sensor nodes has been used for the sensing the information from harsh environment. In these nodes sensors of different types has been used for collecting information. Main problem in this is to detect the node having clone attack, because each and every node has same id and locations at different position on same interval of time. This problem has also been arising in clusters in which clusters replicate and the main problem arises when cluster head replicate.
Keywords: Clustering, WSN, Leach protocol, Cluster heads
Edition: Volume 5 Issue 8, August 2016
Pages: 862 - 866
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 1875 - 1880Microclustering with Outlier Detection for DADC
Aswathy Priya M.
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023
Pages: 1840 - 1846Analysis of Placement for Electronics and Communication Engineering Students using Multiple Clustering
Dr. Dola Sanjay S
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 805 - 811Predicting the Energy Efficiency in Wireless Sensor Networks using LSTM and Random Forest Method
Aruna Reddy H., Shivamurthy G., Rajanna M.
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024
Pages: 1490 - 1494An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication
Mamta, Dr. Shiva Prakash
Downloads: 2
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021
Pages: 649 - 652Image Segmentation using Biogeography based Optimization and its Comparison with K Means Clustering
Babita Chauhan, Preeti Sondhi