CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Detection of Clone Attack in Mobile Wireless Sensor Network

by Benu, Chakshu Goyal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 132 - Number 16
Year of Publication: 2015
Authors: Benu, Chakshu Goyal
10.5120/ijca2015907670

Benu, Chakshu Goyal . Detection of Clone Attack in Mobile Wireless Sensor Network. International Journal of Computer Applications. 132, 16 ( December 2015), 51-55. DOI=10.5120/ijca2015907670

@article{ 10.5120/ijca2015907670,
author = { Benu, Chakshu Goyal },
title = { Detection of Clone Attack in Mobile Wireless Sensor Network },
journal = { International Journal of Computer Applications },
issue_date = { December 2015 },
volume = { 132 },
number = { 16 },
month = { December },
year = { 2015 },
issn = { 0975-8887 },
pages = { 51-55 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume132/number16/23695-2015907670/ },
doi = { 10.5120/ijca2015907670 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:29:40.176183+05:30
%A Benu
%A Chakshu Goyal
%T Detection of Clone Attack in Mobile Wireless Sensor Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 132
%N 16
%P 51-55
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Wireless sensor nodes has been used for the sensing the information from harsh environment. In these nodes sensors of different types has been used for collecting information. In MWSNs the main threat in the network is security. Various types of attacks occurred in these networks. Attack occur in WSN is clone attack which is also known as replica attack. In this attack the node copy the id of the other node and show its predictions at different locations. A clone node can create a black hole or wormhole attack include adversary can use them in different ways. This attack can transmit false information to all legitimate nodes. The clone attack is very suitable for adversary. For this attack adversary has not to be compromise for number of nodes. Main problem in this is to detect the node having clone attack, because each and every node has same id and locations at different position on same interval of time. We can remove this clone attack by using witness approach algorithm. In the presented paper, four parameters are generated i.e Packet Loss, Packet Delay, Packet Delivery Ratio, Throughput and on the basis of these parameters we conclude that our system gives us better performance.

References
  1. M.Contia “Clone wars: Distributed detection of clone attacks in mobile WSNs”, 4321 6754, 123-543, IEEE, 2013.
  2. Md Azharuddin “A Distributed Fault-tolerant Clustering Algorithm for Wireless Sensor Networks”, 978-1-4673-6217-7, IEEE, 2013.
  3. Xuhui Chen “Research on hierarchical mobile wireless sensor network architecture with mobile sensor nodes”, 978-1-4244-6495-1, pp. 2863 – 2867, IEEE, 2010.
  4. Yong-Sik Choi “A study on sensor nodes attestation protocol in a Wireless Sensor Network”, 978-1-4244-5427-3, 1738-9445, IEEE, 2010.
  5. Yuling Lei, “The Research of Coverage Problems in Wireless Sensor Network”, 978-0-7695-3901-0, pp. 31 – 34, IEEE, 2009.
  6. Mittal, R., “Wireless sensor networks for monitoring the environmental activities”, 978-1-4244-5965-0, 1 – 5, IEEE, 2010.
  7. Marriwala, N.; Rathee, P. “An approach to increase the wireless sensor network lifetime” 978-1-4673-4806-5, 495 – 499, IEEE, 2012.
  8. GuanglaiChen “Notice of Retraction the design of wireless wave height sensor network node based on Zigbee technology”, 978-1-4244-8036-4, 3683 – 3686, IEEE, 2011.
  9. Sivasankar, P.T.; Ramakrishnan, M. “Active key management scheme to avoid clone attack in wireless sensor network”
  10. U. Ahmed and F.B. Hussain, “Energy efficient routing protocol for zone based mobile sensor networks”, in proceedings of the 7th international Wireless Communications and Mobile Computing conference (IWCMC), pp. 1081-1086.
  11. Y. Han and Z. Lin. “A geographically opportunistic routing protocol used in mobile wireless sensor networks”, in proceedings of the 9th IEEE international conference on Networking, Sensing and Control (ICNSC), pp. 216-221.
  12. A. Aronsky and A. Segall. “A multipath routing algorithm for mobile Wireless Sensor Networks”, in proceedings of the 3rd Joint IFIP Wireless and Mobile Networking Conference. pp. 1-6.
  13. Yonatan Aumann, Yehuda Lindell” Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries” e 4th Theory of Cryptography Conference (TCC), 2007,pp 1-57
  14. Pekka Nikander Andrei Gurtov Thomas R. Henderson,” Host Identity Protocol (HIP): Connectivity, Mobility, Multi-homing, Security, and Privacy over IPv4 and IPv6 Networks” Communications Surveys & Tutorials, IEEE  (Volume:12 ,  Issue: 2), pp 186 – 204
  15. Priyanka Dubey, Shilpi Sharma, Aabha Sachdev ” Review of First Hop Redundancy Protocol and Their Functionalities”, International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 5- May 2013,pp 1085-1088.
Index Terms

Computer Science
Information Sciences

Keywords

Leach HEED WSN MWSN