Abstract

Wireless sensor networks operate in harsh environment such as in surveillance zones and military area where nodes may be vulnerable to various kinds of attacks. Out of these attacks, one perilous attack is Clone node attack as it can fabricate different kind of attacks in networks. An adversary detains the legitimate sensor node & generates the clones of same identity with captured node in the clone node attack and deploys the replicate nodes in the network. The adversary can easily manage the whole network with the help of these clone nodes. The paper proposes a clone node detection method which detects the replicate node in wireless sensor network. The proposed method, TBCND, deploy the network in Binary search tree form using the node id. We have simulated the proposed method in ns2 in two scenarios - normal network and clone node containing network. Thereafter, we have evaluated the performance of TBCND in terms of PDR, end to end delay, packet loss and residual energy of normal network and clone node network. The result shows that there is no consequence of clone node attack on network using the proposed method.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call