Detection of Clone Attack in Mobile Wireless Sensor Network
نویسندگان
چکیده
منابع مشابه
Detection of Clone Attack in Mobile Wireless Sensor Network
Wireless sensor nodes has been used for the sensing the information from harsh environment. In these nodes sensors of different types has been used for collecting information. In MWSNs the main threat in the network is security. Various types of attacks occurred in these networks. Attack occur in WSN is clone attack which is also known as replica attack. In this attack the node copy the id of t...
متن کاملPerformance analysis and classification of Clone attack detection procedures in mobile wireless sensor networks, pdfkeywords=wireless sensor network (WSN), clone attack, intrusion detection, mobility
Regarding accelerating development of mobile sensor nodes technology, increasing the utilization of them, and also facing with security challenges in these networks; specially clone nodes attack, this paper focuses on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using experimental analysis of procedures. Since many of recommended...
متن کاملClassification and Aanalysis of clone attack detection procedures in mobile wireless sensor networks
In this paper, regarding accelerating development of mobile sensor nodes technology and increasing the utilization of them and alsothese networks are faced with security challenges; specially clone nodes attack, our focus is on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using theoretical analysis of procedures. Since many of re...
متن کاملPerformance Analysis and Classification of Clone Attack Detection Procedures in Mobile Wireless Sensor Networks
Regarding accelerating development of mobile sensor nodes technology, increasing the utilization of them, and also facing with security challenges in these networks; specially clone nodes attack, this paper focuses on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using experimental analysis of procedures. Since many of recommended...
متن کاملDynamic Node Clone Detection Approach in Wireless Sensor Network
Sensor nodes that are placed in hostile environment are easily captured and compromised by any adversary entering into the network. The adversary creates multiple numbers of identical duplicates and adds it to network to reprove the network’s performance. This type of attacks in wireless sensor network are called cloning attacks. Considering a static network in the existing system, two protocol...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2015
ISSN: 0975-8887
DOI: 10.5120/ijca2015907670