TAWS: TABLE ASSISTED WALK STRATEGY IN CLONE ATTACK DETECTION

Wireless Sensor Networks (WSNs) deployed in the destructive atmosphere are susceptible to clone attacks. Clone attack in wireless sensor network is a complicated problem because it deployed in hostile environments, and also the nodes could be physically compromised by an adversary. For valuable clon...

Full description

Bibliographic Details
Main Authors: J Sybi Cynthia, D Shalini Punithavathani
Format: Article
Language:English
Published: ICT Academy of Tamil Nadu 2016-12-01
Series:ICTACT Journal on Communication Technology
Subjects:
Online Access:http://ictactjournals.in/ArticleDetails.aspx?id=2777