IJSRP, Volume 2, Issue 11, November 2012 Edition [ISSN 2250-3153]
M.H Ansari, V. TabatabaVakily
Abstract:
In this paper, regarding accelerating development of mobile sensor nodes technology and increasing the utilization of them and alsothese networks are faced with security challenges; specially clone nodes attack, our focus is on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using theoretical analysis of procedures. Since many of recommended protocols in this area have not been experimentalised and also no comprehensive study has been carried out on the possibility and capability of these procedures, in this paper all types of sensor network architecture, with the presence of mobile sensor node, are analyzed and then according to the type of architecture, the procedures of clone node intrusion detection is classified and meticulously scrutinized. Finally the conclusion is presented based on theoretical analysis.