Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{147630, author = {Ronika Devi and Mohit trehan}, title = {CLONE ATTACK DETECTION IN COMPLEX NETWORK USING OVERLAPPING COMMUNITIES(DCA)}, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {5}, number = {10}, pages = {160-163}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=147630}, abstract = {In today's world the wireless sensor network has great significant in application like defense surveillance, patient health monitoring, traffic control etc. As WSN utilize radio frequencies so there is threat of interference in network. These threats also include distributed denial of service in which the messages that are sent over the network may be attacked by unauthorized user. It would harm the confidentiality of the network user and the services of network. There are various algorithm that are utilized to detect clone attack in WSN but these schemes only stress on prevention of attack after it is occurred. This would leads to the loss of data and more consumption of limited network resources. So in this paper we introduce a new algorithm that is based on DCA along with random walk detection. It would detect earlier the clone attack in WSN and prevent the data loss. The performance of this technique has been analyzed by using parameters like packet delivery ratio, energy consumption by network, throughput. }, keywords = {DCA, WSN, clone detection }, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry