A systematic review on clone node detection in static wireless sensor networks

Muhammad Numan, Fazli Subhan, Wazir Zada Khan, Saqib Hakak, Sajjad Haider, G. Thippa Reddy, Alireza Jolfaei, Mamoun Alazab

Research output: Contribution to journalArticlepeer-review

16 Citations (Scopus)
31 Downloads (Pure)


The recent state of the art innovations in technology enables the development of low-cost sensor nodes with processing and communication capabilities. The unique characteristics of these low-cost sensor nodes such as limited resources in terms of processing, memory, battery, and lack of tamper resistance hardware make them susceptible to clone node or node replication attack. The deployment of WSNs in the remote and harsh environment helps the adversary to capture the legitimate node and extract the stored credential information such as ID which can be easily re-programmed and replicated. Thus, the adversary would be able to control the whole network internally and carry out the same functions as that of the legitimate nodes. This is the main motivation of researchers to design enhanced detection protocols for clone attacks. Hence, in this paper, we have presented a systematic literature review of existing clone node detection schemes. We have also provided the theoretical and analytical survey of the existing centralized and distributed schemes for the detection of clone nodes in static WSNs with their drawbacks and challenges.
Original languageEnglish
Pages (from-to)65450-65461
Number of pages12
JournalIEEE Access
Publication statusPublished - 2020

Bibliographical note

Version archived for private and non-commercial use with the permission of the author/s and according to publisher conditions. For further rights please contact the publisher.


  • Wireless sensor networks (WSNs)
  • clone attack
  • clone attack detection schemes
  • systematic literature review (SLR)

Fingerprint Dive into the research topics of 'A systematic review on clone node detection in static wireless sensor networks'. Together they form a unique fingerprint.

Cite this