Main Article Content
Clone Attack is the very dangerous attack of all the active attacks of Wireless Sensor Network. In this attack, the adversary capture a sensor node from the network with help of that adversary can create any number clone nodes. Clone nodes are controlled by the adversary, which has all the secret keys. So that clone attack is most harmful threat which is very difficult to detect. In mobile sensor network, the nodes move from one location to another regularly. So it is a complicated task to find the clone nodes which exist in the mobile sensor networks. The proposed Central-node Based Clone Detection(CBCD) protocol detect the clone nodes in efficient manner and within minimum detection time compared with existing EDD and XED protocols. The advantage of proposed CBCD protocol include 1) High clone detection ratio; 2) Minimum communication overhead; 3) Minimum End-to-End delay; 4) Minimum latency time; 5) High throughput so on.
Upon receipt of accepted manuscripts, authors will be invited to complete a copyright license to publish the paper. At least the corresponding author must send the copyright form signed for publication. It is a condition of publication that authors grant an exclusive licence to the the INFOCOMP Journal of Computer Science. This ensures that requests from third parties to reproduce articles are handled efficiently and consistently and will also allow the article to be as widely disseminated as possible. In assigning the copyright license, authors may use their own material in other publications and ensure that the INFOCOMP Journal of Computer Science is acknowledged as the original publication place.