The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


Wireless Sensor Network consists of independent sensor nodes that are responsible for monitoring physical conditions. WSN is deployed in hostile environments. So it is vulnerable to capture and compromise by an attacker. An adversary can launch various types of attacks on WSN that can be classified as layer-dependent attack and layer-independent attacks. The layer-independent attacks are Sybil attack and Clone attack. In Clone attack an adversary can capture a sensor and creates clone of a captured node. These clone nodes are deployed in network area. It is difficult to detect clone nodes in the sensor network. There are so many clone detection protocols are available in static and mobile sensor networks. It is more challenging to detect clone attack in mobile WSN compared to the static WSN. The proposed clone attack detection protocol called as Cluster Based Clone Attack Detection (CBCD) discovers the clone nodes available in Mobile WSN. In this protocol sensor network divided into clusters. All the clusters have a cluster head and random number of sensors nodes. This protocol detect clone node according to the movement of sensor nodes. The clone is identified when sensor node move within the cluster or other clusters in the sensor network. Theoretical analysis and simulations have been conducted to evaluate the protocol in terms of clone detection time, clone detection ratio, memory consumption.

Keywords

Clone Attack, Cluster based Clone Detection, Wireless Sensor Network.
User