期刊名称:International Journal of Computer Trends and Technology
电子版ISSN:2231-2803
出版年度:2014
卷号:17
期号:2
页码:84-87
出版社:Seventh Sense Research Group
摘要:Technology and its boundary can be measured in terms of loop hole which we can tell it as vulnerability. If we consider the technology with it’s surrounding of ethical hacker who can crack the system which is loop whole. In terms of wireless sensor network and the clone attacks is crucial in data lose which can be prevented in the acknowledgement based replication mechanism. In this paper, we put the mechanism of the acknowledgement based treatment injection to the direct replica of the attacker. The Distributed protocol which we use to Clone Attacks in Wireless Sensor Networks in the node replica based sensor attack. In the clone mechanism of the distributed parallel system which we put to make a sensible network through the cryptography.