2014
DOI: 10.14445/22315381/ijett-v8p253
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Node Clones in Wireless Sensor Network Using Detection Protocols

Abstract: Wireless sensor networks consist of hundreds to thousands of sensor nodes and are widely used in civilian and security applications. One of the serious physical attacks faced by the wireless sensor network is node clone attack. Thus two node clone detection protocols are introduced via distributed hash table and randomly directed exploration to detect node clones. The former is based on a hash table value which is already distributed and provides key based facilities like checking and caching to detect node cl… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2016
2016
2017
2017

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 5 publications
0
0
0
Order By: Relevance