Mobility Based Algorithms for Detection of Clone Nodes in Mobile Sensor Networks

Download Now
Provided by: International Journal of Advanced Research in Computer Engineering & Technology
Topic: Networking
Format: PDF
Sensor networks are composed of a number of sensor nodes with limited resources and used in application such as environment monitoring and object tracking. This allows a situation where the adversary can compromise one sensor node, fabricate many replicas having the same IDentity (ID) from the captured node, and place these replicas back into strategic positions in the network for further malicious activities. This is called clone node attack. The proposed system focuses on clone node attacks.
Download Now

Find By Topic