Skip to main content

Performance Analysis of Clone Node Attack in Wireless Sensor Network

  • Conference paper
  • First Online:
Proceedings of 2nd International Conference on Communication, Computing and Networking

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 46))

  • 1656 Accesses

Abstract

Nowadays wireless sensor networks are widely used in different applications. The collection of sensor nodes consists of a Wireless Sensor Network (WSN). The sensor nodes, which have small memory, limited battery and limited processing power, sense the data and transmit to base station. Due to its characteristics, WSN can be vulnerable to different types of attacks and clone node attack is one of them. In this attack, attacker selects the few nodes and imitates them using the secret information of the selected node and then deploys in the network. In this paper, we find out the effect of clone node attack in the network. We have compared the performance of WSN in the presence of clone node attack and without clone node attack under six different scenarios in Network Simulator (NS2). We evaluate the effect of clone node attacks in term of Packet Delivery Ratio and make the comparison of packet loss % in normal and Clone node networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. P. Mohanty, S. Panigrahi, N. Sarma, S. Satapathy, Security issues in wireless sensor network data gathering protocols: a survey. J. Theor. Appl. Inform. Technol. 13(1), 14–29 (2005)

    Google Scholar 

  2. M. Sharifnejad, M. Sharifi, M. Ghiasabadi, S. Beheshti, A Survey on Wireless Sensor Networks Security. Fourth International Conference: Sciences of Electronic Technologies of Information and Telecommunication, March 25–29 (2007)

    Google Scholar 

  3. X. Li, L. Qin, I. Liang, in Research on Wireless Sensor Network Security. IEEE Computer Society, International Conference on Computational Intelligence and Security (2010)

    Google Scholar 

  4. T. Bonact, P. Lee, L. Bushnell, R. Poovendra, in Distributed clone detection in wireless sensor networks: an optimization approach. 2nd IEEE International Workshop on Data security and Privacy in Wireless Networks Proceedings, Lucca, Italy (2011)

    Google Scholar 

  5. Y. Wang, G. Attebury, B. Ramamurthy, A survey of security networks issues in wireless sensor networks. IEEE Comm. Suv. Tutorials 8(2), 2–23 (2006)

    Article  Google Scholar 

  6. I.F. Akyildiz, S. William, S. Yogis, R. Cayirci, A survey on sensor network. IEEE Commun. Mag. 40(8), 102–114 (2002)

    Article  Google Scholar 

  7. C. Townsend, S. Arms, Wireless Sensor Network: Principles and Applications (Chapter 22), pp. 439–449

    Google Scholar 

  8. G. Padmavathi, D. Shanmuga, A survey of attacks, security mechanisms and challenges in wireless sensor networks. Int. J. Comput. Sci. Inf. Secur. 4(1) (2009)

    Google Scholar 

  9. J. Ho, D. Lin, M. Wright, S. Das, Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks (Preprint submitted Elsevier, 2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sachin Lalar .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Lalar, S., Bhushan, S., Surender (2019). Performance Analysis of Clone Node Attack in Wireless Sensor Network. In: Krishna, C., Dutta, M., Kumar, R. (eds) Proceedings of 2nd International Conference on Communication, Computing and Networking. Lecture Notes in Networks and Systems, vol 46. Springer, Singapore. https://doi.org/10.1007/978-981-13-1217-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1217-5_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1216-8

  • Online ISBN: 978-981-13-1217-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics