vioft2nntf2t|tblJournal|Abstract_paper|0xf4ff4fe62b0000008b20060001000200 Wireless Sensor Network (WSN) is a combination of autonomous sensor nodes and used to monitor various physical conditions. Static and mobile are two types of WSN. In static WSN the sensor nodes do not alter their positions after deployment. Due to the security constraints, WSN is vulnerable to various types of attacks. In that, Clone attack is the most dangerous attack on WSN. In Clone attack an adversary physically captures a sensor node. It reprograms the detained node and generates many clone nodes. The real nodes and clone nodes are installed in the sensor field, so clone node identification is a difficult task. The new protocol proposed to identify the clone nodes in the static WSN called as Node Based Clone Attack Detection (NBCAD) protocol. This protocol detects the clones in a efficient manner compare with SET and RED protocols. The advantage of proposed NBCAD protocol include high clone detection ratio, minimum communication overhead, minimum end-to-end delay, minimum latency time and high throughput.
J Anthoniraj M.I.E.T Arts and Science College, India
Clone Attack, Adversary, Node deployment, Zigbee, Elliptic Curve Cryptography, Cluster, Clone detection
January | February | March | April | May | June | July | August | September | October | November | December |
0 | 0 | 1 | 0 | 0 | 0 | 2 | 0 | 0 | 3 | 0 | 0 |
| Published By : ICTACT
Published In :
ICTACT Journal on Communication Technology ( Volume: 12 , Issue: 2 , Pages: 2395-2401 )
Date of Publication :
June 2021
Page Views :
372
Full Text Views :
6
|