Abstract

Wireless sensor networks are vulnerable to various kinds of security attacks. In wireless sensor networks, the sensor nodes are usually deployed in geographic locations to keep track of the changes in the environment. Some kind of attacks might occur to the nodes or the data transferred between the nodes. One such kind of attack is the clone attack in which the attacker might physically capture the nodes and replicate it in different locations. In order to detect and prevent the clone attack different approaches are used namely, centralized detection and distributed detection. Various algorithms are used in both these approaches depending upon the network. The distributed approach is one of the most widely used approach to detect the cloned nodes in the network. Considering, the challenges in the sensor network a novel approach has been introduced namely, Secure Low Storage Clone Detection technique. In SLSCD, a trust based clone detection approach is used to identify the cloned nodes in the network.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.