International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 132 | Views: 245

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 1, January 2016 | Popularity: 6.2 / 10


     

Detection and Avoidance of Clone Attack in WSN Using Neighbor Witness Node

Ghansham Dass, Rishideep Singh


Abstract: Wireless sensor nodes has been used for the sensing the information from harsh environment. Wireless sensor networks are of main two types, which are static wireless sensor nodes and mobility wireless sensor networks. In MWSNs the main threat in the network is security. Various types of attacks occurred in these networks. A clone node can create a black hole or wormhole attack include adversary can use them in different ways. This attack can transmit false information to all legitimate nodes. The clone attack is very suitable for adversary. For this attack adversary has not to be compromise for number of nodes. The adversary can do cloning of one node and can predict other nodes through this node. It falsifies its positions at different times at different locations. Main problem in this is to detect the node having clone attack, because each and every node has same id and locations at different position on same interval of time. This problem has also been arising in clusters in which clusters replicate and the main problem arises when cluster head replicate. In purposed work LEACH protocol will be used for clustering.


Keywords: Wireless Sensor Network, LEACH, Clone Attack, Clustering, Replication Attack


Edition: Volume 5 Issue 1, January 2016


Pages: 424 - 428


DOI: https://www.doi.org/10.21275/NOV152684



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Ghansham Dass, Rishideep Singh, "Detection and Avoidance of Clone Attack in WSN Using Neighbor Witness Node", International Journal of Science and Research (IJSR), Volume 5 Issue 1, January 2016, pp. 424-428, https://www.ijsr.net/getabstract.php?paperid=NOV152684, DOI: https://www.doi.org/10.21275/NOV152684



Similar Articles

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 1875 - 1880

Microclustering with Outlier Detection for DADC

Aswathy Priya M.

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 11, November 2023

Pages: 1840 - 1846

Analysis of Placement for Electronics and Communication Engineering Students using Multiple Clustering

Dr. Dola Sanjay S

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 805 - 811

Predicting the Energy Efficiency in Wireless Sensor Networks using LSTM and Random Forest Method

Aruna Reddy H., Shivamurthy G., Rajanna M.

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 5, May 2024

Pages: 1490 - 1494

An Efficient Secure Data Aggregation Strategy in Wireless Sensor Network using MAC Authentication

Mamta, Dr. Shiva Prakash

Share this Article

Downloads: 2

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 9, September 2021

Pages: 649 - 652

Image Segmentation using Biogeography based Optimization and its Comparison with K Means Clustering

Babita Chauhan, Preeti Sondhi

Share this Article
Top