ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Improved Security and Avoid Clone Attack in Wireless Sensor Network

Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 8)

Publication Date:

Authors : ; ;

Page : 862-866

Keywords : Clustering; WSN; Leach protocol; Cluster heads;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In the wireless sensor networks the network nodes are used for the sensing the information from the various types of non-reachable areas. Wireless sensor nodes has been used for the sensing the information from harsh environment. In these nodes sensors of different types has been used for collecting information. Main problem in this is to detect the node having clone attack, because each and every node has same id and locations at different position on same interval of time. This problem has also been arising in clusters in which clusters replicate and the main problem arises when cluster head replicate.

Last modified: 2021-07-01 14:42:41