International Journal of Advanced Research in Computer Engineering & Technology
Sensor networks are composed of a number of sensor nodes with limited resources and used in application such as environment monitoring and object tracking. This allows a situation where the adversary can compromise one sensor node, fabricate many replicas having the same IDentity (ID) from the captured node, and place these replicas back into strategic positions in the network for further malicious activities. This is called clone node attack. The proposed system focuses on clone node attacks.