2020
DOI: 10.11591/ijece.v10i1.pp316-322
|View full text |Cite
|
Sign up to set email alerts
|

Node clone detection using a stable overlay network

Abstract: Wireless sensor networks consist of number of sensor nodes widely distributed in particular region to communicate and sharing the environmental information and also these data’s are stored in central location for further data prediction. Such nodes are susceptible to cloning attack where the adversary captures a node, replicates with the same identity as that of the captured node and deploys the clone back into the network, causing severe harm to the network. Hence to thwart such attacks, a distributed detecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…The nodes that are compromised include those nodes whose identity has been stolen by malicious nodes [7]. Thus, the malicious nodes try to be a part of the network with this stolen identity and disrupt the functions in the network [8]. The malicious nodes also overwhelm the normal sensor nodes with fake packets so that the node's memory is full and the valid packets also gets dropped.…”
Section: Introductionmentioning
confidence: 99%
“…The nodes that are compromised include those nodes whose identity has been stolen by malicious nodes [7]. Thus, the malicious nodes try to be a part of the network with this stolen identity and disrupt the functions in the network [8]. The malicious nodes also overwhelm the normal sensor nodes with fake packets so that the node's memory is full and the valid packets also gets dropped.…”
Section: Introductionmentioning
confidence: 99%