Detection and mitigation of node replication attacks in wireless sensor networks: a survey

WZ Khan, MY Aalsalem… - … Journal of Distributed …, 2013 - journals.sagepub.com
Wireless sensor networks are a collection of a number of tiny, low-cost, and resource-
constrained sensor nodes which are commonly not tamper proof. As a result, wireless …

Random-walk based approach to detect clone attacks in wireless sensor networks

Y Zeng, J Cao, S Zhang, S Guo… - IEEE Journal on selected …, 2010 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone
attacks. In such attack, an adversary compromises a few nodes, replicates them, and inserts …

Classification and experimental analysis for clone detection approaches in wireless sensor networks

K Cho, M Jo, T Kwon, HH Chen… - IEEE Systems Journal, 2012 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) consist of tiny sensor nodes that communicate with each
other over wireless channels, often in a hostile environment where nodes can be captured …

Distributed clone detection in static wireless sensor networks: random walk with network division

WZ Khan, MY Aalsalem, NM Saad - PloS one, 2015 - journals.plos.org
Wireless Sensor Networks (WSNs) are vulnerable to clone attacks or node replication
attacks as they are deployed in hostile and unattended environments where they are …

Low-priced and energy-efficient detection of replicas for wireless sensor networks

K Cho, BG Lee, DH Lee - IEEE Transactions on dependable …, 2013 - ieeexplore.ieee.org
The forthcoming internet of things—an intelligent collaboration of resource-limited devices
such as wireless sensor nodes that are embedded in the daily lives of users—poses new …

Energy‐efficient replica detection for resource‐limited mobile devices in the internet of things

K Cho, BG Lee, K Lee, DH Lee - Iet Communications, 2013 - Wiley Online Library
The forthcoming Internet of Things–an intelligent collaboration of resource‐limited
static/mobile devices that are embedded in the daily lives of users–poses new challenges to …

[PDF][PDF] Sécurisation des Réseaux Ad hoc: Systèmes de Confiance et de Détection de Répliques

AITS Boussad - 2011 - cdn.unilim.fr
Résumé L'évolution rapide des technologies sans fil a permis l'émergence de nouveaux
types de réseaux très dynamiques avec des architectures fortement décentralisées et dont …

Location and Time based clone detection in wireless sensor networks

R Sivaraj, R Thangarajan - 2014 Fourth International …, 2014 - ieeexplore.ieee.org
A Wireless Sensor Network (WSN) consists of several sensor nodes that are deployed in a
aggressive environment to monitor and record the changes that take place in certain …

[PDF][PDF] Clone attack detection using pair access witness selection technique

JS Cynthia, DS Punithavathani - Int. J. Comput. Netw. Appl, 2016 - mail.ijcna.org
Sensor nodes set out in malicious surroundings and are susceptible to pickup and pact. An
intruder may reach confidential hidden particulars from these sensors, clone and cleverly …

[PDF][PDF] An Overview of Replica Node Detection Wireless Sensor Networks

VR Prabha, P Latha - International Conference on Recent Trends in …, 2012 - Citeseer
ABSTRACT Wireless Sensor Networks deployed in hostile environment are vulnerable to
many attacks due to the nature of deployment and poor physical security. An attacker can …