{"title":"Proficient algorithms for replication attack detection in Wireless Sensor Networks — A survey","authors":"R. Sathish, D. R. Kumar","doi":"10.1109/ICE-CCN.2013.6528465","DOIUrl":null,"url":null,"abstract":"Due to the operating nature of the sensor networks they are often unattended and the sensor nodes in the network are prone to different kinds of novel attacks. These networks are expected to find increasing deployment in coming years, as they enable reliable monitoring and analysis of unknown and untested environments. Enabling secure communication among the sensors is a major concern in WSN. In this paper we survey different efficient algorithms to detect the clone attacks in the Wireless Sensor Networks. We compare these algorithms considering various complexity metrics.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICE-CCN.2013.6528465","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
Due to the operating nature of the sensor networks they are often unattended and the sensor nodes in the network are prone to different kinds of novel attacks. These networks are expected to find increasing deployment in coming years, as they enable reliable monitoring and analysis of unknown and untested environments. Enabling secure communication among the sensors is a major concern in WSN. In this paper we survey different efficient algorithms to detect the clone attacks in the Wireless Sensor Networks. We compare these algorithms considering various complexity metrics.