INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS www.ijrcar.in Vol.2 Issue.3, Pg.: 49-57 March 2014 Avneet Kaur et al Page 49 INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DETECTION OF CLONE ATTACKS IN WIRELESS SENSOR NETWORKS: A SURVEY Avneet Kaur 1 , P. S. Mann 2 Research Scholar in Computer Science and Engineering Department 1 , er.avneetkaur14@gmail.com 1 Faculty of IT Department 2 , psmaan@hotmail.com 2 Author Correspondence: DAV Institute of Engineering and Technology 1, 2 , Jalandhar (Punjab), India, 8427799680 1 , 9888395367 2 , er.avneetkaur14@gmail.com 1 , psmaan@hotmail.com 2 Abstract Wireless Sensor networks (WSN) is a rising technology and have immense prospective to be employed insignificant situations like battlefields and commercial applications such as construction, traffic observation, habitation monitoring and many more circumstances. Wireless sensor networks (WSNs) deployed in such an environment in which sensor nodes are vulnerable to so many attacks like sinkhole, wormhole, selective forward, Sybil and clone attack, so security is a vital requirement for WSNs to maintain the integrity, validity, confidentiality and accessibility of data that is transmitted between the nodes in networks. In this paper, wide variety of attacks have been discussed and we concentrate on the most distinctive attack or threat known as node replication attack or clone node attack, where an enemy creates its own sensor nodes called clone nodes by physically capture one node’s ID and cryptographic secrets. Detecting the node replication attack has turn into a crucial research topic in sensor n etwork security. In this survey, we have deliberated the existing detection schemes for detection of clone attacks that comes under the centralized and distributed techniques. Keywords: Wireless Sensor Networks, Security Requirements, Security Attacks, Clone Attack Detection Schemes. 1. Introduction Wireless Sensor Network An environment in which large number of sensor nodes is densely deployed and communicate wirelessly with each other over a limited frequency and bandwidth is known as Wireless Sensor Network. These sensor nodes sensed the data and forward it to the base station through multi-hop routing. In WSNs there are two other mechanisms, called "aggregation points" and "base stations", which have extra influential resources than normal sensors where aggregation points collect information from their nearby sensors, integrate them and then forward to the base stations to process gathered data, as shown in figure1 [1]. Generally, there are two kinds of applications for WSNs including, monitoring and tracking [2]; therefore, some of most common applications of these networks are: military, medical, environmental monitoring, industrial,