Clone Node Detection in Heterogeneous WSN with Low Memory Overhead

نویسندگان

چکیده

In unattended areas, the wireless sensor network is deployed and nodes are always open to attacks. An adversary can capture a node deploy many nodes, which clone of captured, in called or replicated by using credential information retrieved from captured node. These damage directly indirectly. This attack replication o attack. this area, so works introduced all these methods use random key code, location information, detect nodes. paper presents method that does not any information. The simulation results show it performs better than previous methods.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Incremental inconsistency detection with low memory overhead

Ensuring models’ consistency is a key concern when using a model-based development approach. Therefore, model inconsistency detection has received significant attention over the last years. To be useful, inconsistency detection has to be sound, efficient and scalable. Incremental detection is one way to achieve efficiency in the presence of large models. In most of the existing approaches, incr...

متن کامل

Tiny Low-Power WSN Node for the Vehicle Detection

In this paper, a tiny low-power wireless sensor network (WSN) node based on msp430 microcontroller is introduced. The node should be serving the needs of a special WSN used for traffic monitoring, or more precisely for the indication of vehicle’s presence. The single vehicle detection is based on the utilization of magnetometer sensor, where the change of Earth’s magnetic field, caused by the m...

متن کامل

Decentralised malicious node detection in WSN

The sensitive role that wireless sensor networks (WSNs) play in interpreting the environment characteristics and the need for ensuring the integrity of the sensor readings, necessitate the use of security mechanisms. One of the main security issues in WSNs is manifested when malicious nodes spoof their identities and locations. In this paper, we propose a decentralised malicious node detection ...

متن کامل

Node Clone Detection in Wireless Sensor Networks

Wireless sensor networks are harmed to the node clone, and different distributed protocols have been proposed to detect this attack. However, they require too strong assumptions to be practical for randomly deployed sensor networks. Here, we propose two new node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a DHT concept whic...

متن کامل

Clone Attack Detection in MWSN Using Neighbor Node Information

Various types of attacks occurred in WSN network. Attack occur in WSN is clone attack which is also known as replica attack. In this attack the node copy the id of the other node and show its predictions at different locations. A clone node can create a black hole or wormhole attack include adversary can use them in different ways. This attack can transmit false information to all legitimate no...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International journal of recent technology and engineering

سال: 2022

ISSN: ['2277-3878']

DOI: https://doi.org/10.35940/ijrte.c7206.0911322