A HIGH EFFICIENT APPROACH CLONEATTACK DETECT USING DIGITAL WIRELESS SENSOR NETWORK

Main Article Content

T. Selvi
P. Shobana

Abstract

Sensor nodes that are placed in hostile environment are easily captured and compromised by any adversary entering into the network. The node creates multiple numbers of identical duplicates and add network to reprove the network WSNs performance. This type of attacks in wireless sensor network are called cloning attacks. Considering static network in the currentsystem, two protocols have been used for clone detection namely, proposed work is implemented detection in the dynamic sensor network, where the clone detection is more active and efficient using cloning attack protocol.it provide a satisfactory level of security and storage consumption compared to the leach existing work. Communicationoverhead directly above consists of distributed clone process attack clone independent sensors to find physical or same data Codeefficient detection cryptographic information can easily perform network operations and clone attacks change into one of the most critical security digital issues in WSNs.size and cost constraints on sensor node corresponding resources drive memory, computational directed hash table explorationspeed and communications bandwidth. Environmentcircumstances, such as temperature, sound, vibration, pressure to pass their data through the network to achieve common objective network.Replicates them and then deploys arbitrary Number of replicas throughout the network. If this attack is not detected then these replicas will consume network resources and can make the network vulnerable to a large class of internal attacks. Hardware of sensor clone node changed easily most wireless sensor network the messages received by the mode or the base-station is not being changed or damaged. Approach data authentication allows a receiverinvolvesunprotected sensors nodes. Commonly deployed an environment easily attack analyze some developments sensor high efficient digital WSNs sensornetwork.

Downloads

Download data is not yet available.

Article Details

Section
Articles