N Malhotra, M Bala - Computers, Materials & Continua, 2022 - cdn.techscience.cn
Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility. In
such attacks, an adversary accesses a few network nodes, generates replication, then …