International Journal on Computer Science and Technology (IJCST)
"Wireless Sensor Networks (WSNs) are vulnerable to the node clone, and several distributed protocols have been proposed to detect this attack. In this paper, it presents two novel, practical node clone detection protocols with different tradeoffs on network conditions and performance. The first proposal is based on a Distributed Hash Table (DHT) by which a fully decentralized, key-based caching and checking system is constructed to catch cloned nodes. The protocol's performance on memory consumption and a critical security metric are theoretically deducted through a probability model, and the resulting equations, with necessary adjustment for real application, are supported by the simulations."