Abstract

Wireless Sensor Network (WSN) is a combination of autonomous sensor nodes and used to monitor various physical conditions. Static and mobile are two types of WSN. In static WSN the sensor nodes do not alter their positions after deployment. Due to the security constraints, WSN is vulnerable to various types of attacks. In that, Clone attack is the most dangerous attack on WSN. In Clone attack an adversary physically captures a sensor node. It reprograms the detained node and generates many clone nodes. The real nodes and clone nodes are installed in the sensor field, so clone node identification is a difficult task. The new protocol proposed to identify the clone nodes in the static WSN called as Node Based Clone Attack Detection (NBCAD) protocol. This protocol detects the clones in a efficient manner compare with SET and RED protocols. The advantage of proposed NBCAD protocol include high clone detection ratio, minimum communication overhead, minimum end-to-end delay, minimum latency time and high throughput.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.