High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Clone Attack in Wireless Sensor Networks

Author(s):

Amanpreet Kaur , GZS PTU Campus, Bathinda; Dinesh Kumar, GZS PTU Campus, Bathinda

Keywords:

Wireless Sensor Network, Clone Nodes, Energy Consumption, Clone Attack

Abstract

The increasing growth of mobile sensor nodes technology and rising the deployment of them; these networks are faced with security challenges; specially clone nodes attack. In Mobile Wireless Sensor Network, the attacker can capture a node easily and compromise that sensor node and take out all the keying materials from that compromised node and make duplicate of them. These replica node attacks are hazardous because they permit the attacker to control the compromise of a few nodes to use control over much of the network .Then attacker use the replica node to insert fake data and disturb the whole operations in the network. In this paper an general review of the methodologies to identify or prevent such attacks has been presented.

Other Details

Paper ID: IJSRDV3I40558
Published in: Volume : 3, Issue : 4
Publication Date: 01/07/2015
Page(s): 982-984

Article Preview

Download Article