Wireless sensor networks are used today in numerous applications. Due to the limited battery, storage and processing power, the sensor node absorbs the environment and sends data to the base station. Wireless sensor networks are vulnerable to various attacks due to their limited functionality. Clone node is the attack where adversary physically grabs the node from its location & generates various nodes by using secret information and reflects them on the network. Due to node cloning, various attacks can easily occur in WSN. In this paper, we describe the layer by layer attacks generated by the clone node in WSN. We compare the network scenarios in Network Simulator 2 in which first scenario are normal network & second scenario has the clone nodes which produce the attack inside network. We estimate the impact of clone node in form of packet loss and also compare packet loss rate in normal network and clone node containing network in 8 different scenarios.
CITATION STYLE
Lalar, S., Bhushan, S., & Surender. (2019). Exploration of attacks originate by clone node in wireless sensor network. International Journal of Innovative Technology and Exploring Engineering, 8(12), 3833–3838. https://doi.org/10.35940/ijitee.L3345.1081219
Mendeley helps you to discover research relevant for your work.