International Journal of Computer Applications
In this paper, the authors aim to detect the cloned node in the environment network. The most conspicuous attack in Wireless Sensor Network (WSN) is node replication attack. In this attack the nodes are replicated manually based on their id and key values. Cloned node or adversary promotes the node key or id of the original node, creates more replicas of the particular node in the current network with the same id and also this node may cripple the entire network. In mobile network the detection of replicated node is somewhat difficult and easy manner.