Loading

Exploration of Attacks Originate by Clone Node in Wireless Sensor Network
Sachin Lalar1, Shashi Bhushan2, Surender3

1Sachin Lalar*, Ph.D. Research Scholar, CSE, IKGPTU, Kapurthala, India.
2Shashi Bhushan, Professor, I.T., CGC, Landran, Punjab, India.
3Surender, Computer Appl GTB, Bhawanigarh, India.

Manuscript received on September 16, 2019. | Revised Manuscript received on 24 September, 2019. | Manuscript published on October 10, 2019. | PP: 3834-3838 | Volume-8 Issue-12, October 2019. | Retrieval Number: L3345081219/2019©BEIESP | DOI: 10.35940/ijitee.L3345.1081219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Wireless sensor networks are used today in numerous applications. Due to the limited battery, storage and processing power, the sensor node absorbs the environment and sends data to the base station. Wireless sensor networks are vulnerable to various attacks due to their limited functionality. Clone node is the attack where adversary physically grabs the node from its location & generates various nodes by using secret information and reflects them on the network. Due to node cloning, various attacks can easily occur in WSN. In this paper, we describe the layer by layer attacks generated by the clone node in WSN. We compare the network scenarios in Network Simulator 2 in which first scenario are normal network & second scenario has the clone nodes which produce the attack inside network. We estimate the impact of clone node in form of packet loss and also compare packet loss rate in normal network and clone node containing network in 8 different scenarios.
Keywords: Wireless Sensor Network, Attacks, Clone Node Attack, Packet loss.
Scope of the Article: Wireless Sensor Network