2018
DOI: 10.1155/2018/4396381
|View full text |Cite
|
Sign up to set email alerts
|

A Clone Detection Algorithm with Low Resource Expenditure for Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) are facing the threats of clone attacks which can launch a variety of other attacks to control or damage the networks. In this paper, a novel distributed clone detection protocol with low resource expenditure is proposed for randomly deployed networks. The method consisting of witness chain establishment and clone detection route generation is implemented in the nonhotspot area of the network organized in a ring structure, which balances the resource consumption in the whole net… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 17 publications
0
4
0
Order By: Relevance
“…Several clone node detection techniques and fault detection techniques have been proposed in the literature, with the majority of them focusing on the node's location, because each node in the network has a unique node id and spatial coordinates, and if two different nodes in the network claim the same node id but with different spatial coordinates, it clearly indicates the presence of a clone node and its attack. In [6] replication attacks were detected using nearby social signatures. Witness nodes [7] need more battery power, memory, energy, and other resources than normal nodes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Several clone node detection techniques and fault detection techniques have been proposed in the literature, with the majority of them focusing on the node's location, because each node in the network has a unique node id and spatial coordinates, and if two different nodes in the network claim the same node id but with different spatial coordinates, it clearly indicates the presence of a clone node and its attack. In [6] replication attacks were detected using nearby social signatures. Witness nodes [7] need more battery power, memory, energy, and other resources than normal nodes.…”
Section: Related Workmentioning
confidence: 99%
“…7. The consumption of energy of a node in a mobile network is defined as the sum of the processor energy (E P ), mobility energy (EMob), and transceiver energy (E Tr ) [16] which is represented in (6), where E C is defined as the total energy consumed and the energy of the processor is defined by (7) and where E Pzstate is the processor state energy consumption and E Pchange is the energy consumed in state transition. Transceiver energy consumption is defined by (8):…”
Section: Energy Consumptionmentioning
confidence: 99%
“…A novel distributed clone detection protocol was designed in [18] with lesser resource utilization. The designed protocol increases the detection probability, but the higher packet delivery ratio was not achieved.…”
Section: Related Workmentioning
confidence: 99%
“…This method has high detection accuracy but it restricts the memory for resources. Zhihua Zhang, ShoushanLuo, Hongliang Zhu, Yang Xin [7] used witness based location dependent algorithm and are similar to LSM, RED, LSCD, protocols. It has a higher detection probability equal to 1.…”
Section: Related Workmentioning
confidence: 99%