Abstract

Wireless sensor networks are vulnerable to various kinds of security attacks. In wireless sensor networks, the sensor nodes are usually deployed in geographic locations to keep track of the changes in the environment. Some kind of attacks might occur to the nodes or the data transferred between the nodes. One such kind of attack is the clone attack in which the attacker might physically capture the nodes and replicate it in different locations. In order to detect and prevent the clone attack different approaches are used namely, centralized detection and distributed detection. Various algorithms are used in both these approaches depending upon the network. The distributed approach is one of the most widely used approach to detect the cloned nodes in the network. Considering, the challenges in the sensor network a novel approach has been introduced namely, Secure Low Storage Clone Detection technique. In SLSCD, a trust based clone detection approach is used to identify the cloned nodes in the network.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call