2019
DOI: 10.35940/ijrte.d7192.118419
|View full text |Cite
|
Sign up to set email alerts
|

Exploration of Detection Method of Clone Attack in Wireless Sensor Network

Abstract: Wireless sensor networks have a lot of sensor nodes that are small, cheap and resource-constraints, but are often used to perform various monitoring operations in unmanned and demanding environments. Networks are vulnerable to different application-based and application-independent attacks. We examine node replication attacks, which are typical threats in the sensor network. In this attack, the enemy generates its own sensor node using stealing sensor from network. The attacker physically occupies the node, ta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 15 publications
0
1
0
Order By: Relevance
“…In the node replication attack [34,35], the intruder controls some sensor vertices and creates replicas to spread on all sides of MWSN (Mobile WSN). The intruder extracts the information about secret messages and routing techniques to control entire MWSN.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In the node replication attack [34,35], the intruder controls some sensor vertices and creates replicas to spread on all sides of MWSN (Mobile WSN). The intruder extracts the information about secret messages and routing techniques to control entire MWSN.…”
Section: Literature Reviewmentioning
confidence: 99%