International Journal of Soft Computing And Artificial Intelligence (IJSCAI)
.
current issues
Volume-7,Issue-2  ( Nov, 2019 )
Statistics report
Sep. 2020
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 14
Paper Published : 188
No. of Authors : 530
  Journal Paper

Paper Title
Simulation Approach To Detect Clone Attack In Wireless Sensor Network

Abstract
The advantages and recent advances in the wireless sensor technology have made wireless sensor networks suitable for wide variety of applications. With this a need to protect such systems from various adversaries has increased and has been a research area in past few years. One such attack that is most common and significant is cloning attack or node replication attack. In clone attack an adversary captures only a few of nodes, replicates them and then deploys arbitrary number of replicas throughout the network. If this attack is not detected then these replicas will consume network resources and can make the network vulnerable to a large class of internal attacks. This paper presents a novel approach to combat the effects of clone attack or node replication attack in a wireless sensor network. The proposed employs the use of a MAC layer agent, which checks the signatures of the communication within the network. If similar signatures are found for more than 1000 packets then all the nodes except the one that generated the signature are declared as cloned nodes and are removed from the network. The proposed method has been implemented using NS-2. The results of the implementation show that the proposed method is efficient to detect clone attack in the WSN efficiently without any excessive overheads.


Author - Varsha A.Khandekar, Piyush Singh, Gaurav Shrivastava

| PDF |
Viewed - 45
| Published on 2014-01-24
   
   
IRAJ Other Journals
IJSCAI updates
IJSCAI Volume-6,Issue-2 ( Nov, 2018 )
The Conference World

JOURNAL SUPPORTED BY