HOME INDEXING CALL FOR PAPERS JOURNAL POLICY MANUSCRIPT CURRENT ARCHIVES ONLINE SUBMISSION EDITORIAL TEAM
   
TITLE : Clone Detection Approaches in Wireless Sensor Networks: A Review  
AUTHORS : Ramneet Singh      Lal Chand            
ABSTRACT :

Wireless Sensor Networks are self-configured networks which consist of number of small low-cost sensor nodes that are often deployed in vigorous physical or environmental conditions for monitoring and analyzing the changes occurring in that particular environment. The concept of wireless sensor networks is used in various applications such as military surveillance, natural disaster relief, biomedical health monitoring etc. The wireless sensor nodes are very prone to a capturing attack known as clone attack. In this technique, an adversary physically captures a node from the network, spoofs its credentials, creates a replicate node and then deploys it into the network. This is possibly done to cause damage to various applications of WSNs. There are different techniques been proposed so far to detect these clone attacks in sensor networks. In this paper we will be discussing several clone detection techniques by making certain comparisons as well as proposing future related work by analyzing different parameters related to efficiency of wireless sensor networks.    

Index Terms:  Wireless sensor networks, clone attacks, security, clone detection techniques. 

 
  Download Full Paper
 
Copyrights ©Sathyabama Institute of Science and Technology (Deemed to be University).
Powered By: Infospace Technologies