ABSTRACT

Over the last decade, the term Internet of things (IoT) draws the attention of many people by presenting its future goal toward providing a worldwide network of physical objects, which include anything, anytime connectivity for anyone. In short, it could connect things-to-things, human-to-things, and human-to-human in a global network. The Wireless sensor network (WSN) solution has already covered a large range of IoT applications and research. Now the time has arrived where the generic WSN components have to develop in such a way so that it can handle specific IoT application requirements. Effective countermeasures against this attack are very important as a whole for the proper implementation of different network functions in WSN-based IoT applications. In conclusion, however, the cloned node attacker detection techniques still have several issues and challenges to mitigate in order to become more appropriate for real-life IoT applications and acceptable for resource-constrained WSNs.