The International Journal of Innovative Research in Computer and Communication Engineering
Wireless sensor networks are resource constrained and vulnerable to various kinds of attacks. In this paper, the authors study node clone attack. Many solutions came into existence and for detecting this attack. Many solutions need assumptions to have the problem solved in large-scale deployment of sensors. They have tradeoffs between the solutions provided and network conditions. Recently, the researchers proposed two protocols for node clone detection with different tradeoffs with network conditions. Distributed Hash Table (DHT) was used to have distributed mechanisms for node clone detection.