Open Access Open Access  Restricted Access Subscription or Fee Access

Cluster Based Mechanism for Clone Detection in WSN

Jiju S. John, R. Kayalvizhi, V. Vaidehi


Wireless Sensor Networks deployed for various kinds of applications are prone to large number of attacks. Among various kinds of attacks, clone attack is predominant where a node pretends to have multiple identities and act as a legitimate node further launching several other attacks by taking control over the network. The existing solutions are not satisfactory as they consume large energy and memory. The proposed work deals with the implementation of cluster based mechanism for the detection of clone node otherwise known as node replication attacks. It shows that the proposed method has more detection probability and consumes less energy than the existing distributed approach.


Clone Attack, Clustering, Cost Estimation, RED.

Full Text:



Bo Zhu, Sanjeev Setia, Sushil Jajodia, Sankardas Roy, and Lingyu Wang, “Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks”, IEEE Transactions on Mobile Computing, vol. 9, no. 7, pp. 913-926, July 2010.

Bryan Parno, Adrian Perrig, Virgil Gligor,”Distributed Detection of Node Replication Attack in Sensor Networks”, Proceedings of the 2005 IEEE Symposium on Security and Privacy, sep 2005.

Fu Fei, Liu Jing, Yin Xianglan, “Space-time Related Pairwise Key Predistribution Scheme for Wireless Sensor Networks”, International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2692 – 2696, sep 2007.

Garth V. Crosby, Lance Hester, and Niki Pissinou, Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks”, International Journal of Network Security, Vol.12, No.2, pp.107-117, Mar. 2011.

H. Choi, S. Zhu, and T.F. La Porta, “SET: Detecting Node Clones in Sensor Networks,” Proceedings International Conference on Security and Privacy in Communication Networks and the Workshops (SecureComm ’07), pp. 341-350, 2007.

OssamaYounis, Sonia Fahmy ,"HEED: A Hybrid, Energy- Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks", IEEE transaction on Mobile computing, Vol.3, Oct-Dec 2004, pp.366-379.

Philip Levis, Nelson Lee†, Matt Welsh], and David Culler,”TOSSIM: Accurate and Scalable Simulation of Entire TinyOS Applications”. In Proceedings of the First ACM Conference on Embedded Networked Sensor Systems, 2003.

Mauro Conti, Member, IEEE, Roberto Di Pietro,Luigi Vincenzo Mancini, and Alessandro Mei, Member, IEEE, “Distributed Detection of Clone Attacks in Wireless Sensor Networks”, IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 5, pp. 685-698, Sep 2011.

Md. Moniruzzaman, Md. Junaid Arafeen, Saugata Bose, “Overview of Wireless Sensor Networks: Detection of Cloned Node Using RM, LSN, SET, Bloom Filter and AICN Protocol and Comparing Their Performances”, International Journal of Digital Content Technology and its Applications Volume 3, No. 3, September 2009

Nath.R ,“A TOSSIM based implementation and analysis of collection tree protocol in wireless sensor networks” Published in: International Conference on Communications and Signal Processing (ICCSP), 3-5 April 2011

Adrian Perrig, Virgil Gligor, Bryan Parno “Distributed Detection of Node Replication Attacks in Sensor Networks”. Proceedings of the 2005 IEEE Symposium on Security and Privacy,2005.

Yingpei Zeng, Jiannong Cao, Senior Member, IEEE, Shigeng Zhang, Shanqing Guo and Li Xie, ” Random-Walk Based Approach to Detect Clone Attacks in Wireless Sensor Networks”, IEEE Journal on selected areas in communications, vol. 28, no. 5, June 2010.

H. WenJ. LuoL.Zhou. “Lightweight and effective detection scheme for node Clone attack in wireless sensor networks”. Published in IET Wireless Sensor Systems,2011.


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.