Clone Node Detection in Heterogeneous WSN with Low Memory Overhead
Sajitha M1, D Kavitha2, P Chenna Reddy3

1Sajitha M, Department of CSE, JNTU Anantapur, Ananthapuramu, India.
2D Kavitha, Department of CSE, G Pulla Reddy Engineering College, Kurnool, India.  
3P Chenna Reddy, Department of CSE, JNTU Anantapur, Ananthapuramu, India. 
Manuscript received on 09 July 2022 | Revised Manuscript received on 16 July 2022 | Manuscript Accepted on 15 September 2022 | Manuscript published on 30 September 2022 | PP: 21-26 | Volume-11 Issue-3, September 2022 | Retrieval Number: 100.1/ijrte.C72060911322 | DOI: 10.35940/ijrte.C7206.0911322
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: In unattended areas, the wireless sensor network is deployed and the nodes are always open to attacks. An adversary can capture a node and can deploy many nodes, which are clone of the captured, in the network called clone node or replicated node by using the credential information retrieved from captured node. These clone nodes can damage the network directly or indirectly. This attack is called node replication o attack or clone node attack. In this area, so many works are introduced and all of these methods use a random key or code, or location information, to detect clone nodes. This paper presents a method that does not use any of this information. The simulation results show that it performs better than previous methods. 
Keywords: Clone Node or Replicated Node, Computational Overhead, Detection Probability, Storage Overhead, WSN
Scope of the Article: WSN