Cost Effective Method for Detecting Clone Nodes in Wireless Sensor Network

  • 2 Sajitha
  • Published 2015


In most of wireless sensor application security is one of the prime concern. Generally sensor nodes are not equipped with any tamper resistant hardware and they are deployed in a hostile environment, so the chance of occurring attacks should be greater. In node clone attack adversary will capture few nodes from the network, retrieving its credentials and… (More)


4 Figures and Tables