International Journal of Emerging Technology in Computer Science and Electronics ( IJETCSE)
Wireless sensor networks are the weakest to the node clone, and several distributed protocols have been proposed to detect this attack. So, they require too strong assumptions to be practical for large scale, randomly deployed sensor networks. In this paper, to propose two novel node clone detection protocols with different tradeoffs on network conditions and performance. The first one is based on a Distributed Hash Table (DHT) in which chord algorithm is used to detect the cloned node, every node is assigned with unique key, and before it transmits the data it has to give its key which would be verified by the witness node.