Clone Attack Detection Procedures in Wireless Sensor Networks - Classification & Analysis

Download Now
Provided by: International Journal of Engineering Technology & Management Research (IJETMR)
Topic: Security
Format: PDF
In this paper, regarding accelerating development of mobile sensor nodes technology and increasing the utilization of them and also these networks are faced with security challenges; specially clone nodes attack, the authors' focus is on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using theoretical analysis of procedures. Since many of recommended protocols in this area have not been experimentalised and also no comprehensive study has been carried out on the possibility and capability of these procedures, in this paper all types of sensor network architecture, with the presence of mobile sensor node, are analyzed and then according to the type of architecture, the procedures of clone node intrusion detection is classified and meticulously scrutinized.
Download Now

Find By Topic