2014
DOI: 10.5120/15897-5138
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Detection of Clones in Wireless Sensor Networks

Abstract: Now a days wireless sensor networks (WSN) have wide applications in variety of fields such as military purposes, environmental monitoring, and gathering sensing information in inhospitable locations. But with the increase in use of wireless sensor network the risk of data leakage also increased. The adversary can launch different types of attacks to the network which may subvert the overall functioning of the network. Sometimes the attacker captures some nodes from the network and their credentials will be col… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…1) Sinkhole Attack: In this attack, the attacker falsely claims to offer a shorter route to the destination node when a source node initiates a route discovery mechanism [50]. If the source node selects this deceptive route, the attacker node can eavesdrop on all network traffic between the source and destination nodes, effectively executing a sinkhole attack [9].…”
Section: Attacksmentioning
confidence: 99%
“…1) Sinkhole Attack: In this attack, the attacker falsely claims to offer a shorter route to the destination node when a source node initiates a route discovery mechanism [50]. If the source node selects this deceptive route, the attacker node can eavesdrop on all network traffic between the source and destination nodes, effectively executing a sinkhole attack [9].…”
Section: Attacksmentioning
confidence: 99%