Clone Node Detection in Heterogeneous WSN with Low Memory Overhead
نویسندگان
چکیده
In unattended areas, the wireless sensor network is deployed and nodes are always open to attacks. An adversary can capture a node deploy many nodes, which clone of captured, in called or replicated by using credential information retrieved from captured node. These damage directly indirectly. This attack replication o attack. this area, so works introduced all these methods use random key code, location information, detect nodes. paper presents method that does not any information. The simulation results show it performs better than previous methods.
منابع مشابه
Incremental inconsistency detection with low memory overhead
Ensuring models’ consistency is a key concern when using a model-based development approach. Therefore, model inconsistency detection has received significant attention over the last years. To be useful, inconsistency detection has to be sound, efficient and scalable. Incremental detection is one way to achieve efficiency in the presence of large models. In most of the existing approaches, incr...
متن کاملTiny Low-Power WSN Node for the Vehicle Detection
In this paper, a tiny low-power wireless sensor network (WSN) node based on msp430 microcontroller is introduced. The node should be serving the needs of a special WSN used for traffic monitoring, or more precisely for the indication of vehicle’s presence. The single vehicle detection is based on the utilization of magnetometer sensor, where the change of Earth’s magnetic field, caused by the m...
متن کاملDecentralised malicious node detection in WSN
The sensitive role that wireless sensor networks (WSNs) play in interpreting the environment characteristics and the need for ensuring the integrity of the sensor readings, necessitate the use of security mechanisms. One of the main security issues in WSNs is manifested when malicious nodes spoof their identities and locations. In this paper, we propose a decentralised malicious node detection ...
متن کاملNode Clone Detection in Wireless Sensor Networks
Wireless sensor networks are harmed to the node clone, and different distributed protocols have been proposed to detect this attack. However, they require too strong assumptions to be practical for randomly deployed sensor networks. Here, we propose two new node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a DHT concept whic...
متن کاملClone Attack Detection in MWSN Using Neighbor Node Information
Various types of attacks occurred in WSN network. Attack occur in WSN is clone attack which is also known as replica attack. In this attack the node copy the id of the other node and show its predictions at different locations. A clone node can create a black hole or wormhole attack include adversary can use them in different ways. This attack can transmit false information to all legitimate no...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International journal of recent technology and engineering
سال: 2022
ISSN: ['2277-3878']
DOI: https://doi.org/10.35940/ijrte.c7206.0911322