@article{1492, author = {Ramneet Kaur}, title = {Detection of Node Replication Attacks in Wireless Sensor Networks}, journal = {Journal of Information Technology Review}, year = {2014}, volume = {5}, number = {1}, doi = {}, url = {http://www.dline.info/jitr/fulltext/v5n1/3.pdf}, abstract = {Because of their exceptional qualities, WSNs are grabbing attention in the research community. WSNs are very less into view. Subsequently it is easily possible for an assaulter to catch a node physically, altering its code and getting private data like cryptographic keys. Wireless medium is inherently broadcast in nature which makes it open to attacks. These attacks can bother the operation of WSN and can even kill the purpose of their deployment [3]. Keeping in mind the end goal to ensure the data in WSN, some approaches are severely required that can make data transmission more secure from the attackers. Node replication attack or clone attack is a standout amongst the most destructive and perilous risk to an unattended wireless sensor network in light of the fact that in this attack, an adversary not only compromises the sensor nodes but can also carry out a large class of internal attacks for instance DoS attack, Sybil attack, and Black hole, and wormhole attack. Numerous strategies have been proposed for the detection of node replication attack and some fairly serious limitations like the base station introduce a single point of failure, and any compromise of the base station makes the solution useless. This leads to the motivation to work in this research area. A solution to avoid the node replication attack has been proposed. The solution will be implemented in NS-2.}, }