Localization-free detection of replica node attacks in wireless sensor networks using similarity estimation with group deployment knowledge

C Ding, L Yang, M Wu - Sensors, 2017 - mdpi.com
Due to the unattended nature and poor security guarantee of the wireless sensor networks
(WSNs), adversaries can easily make replicas of compromised nodes, and place them …

Dishonest recommendation attacks in wireless sensor networks: A survey

F Khedim, N Labraoui… - 2015 12th International …, 2015 - ieeexplore.ieee.org
Trust and reputation models in wireless sensor networks (WSN) have been recently
proposed by many researches as an innovative solution for guaranteeing an effective …

A novel algorithm for detecting node clone attack in wireless sensor networks

DS Patil, SC Patil - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
Dynamically changing, self configuring wireless sensor network consists of sensor nodes
often deployed in harsh environment. Because of the unattended nature and lack of tamper …

Prevention of node replication in wireless sensor network using received signal strength indicator, link quality indicator and packet sequence number

S Roy, MJ Nene - … on Green Engineering and Technologies (IC …, 2016 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) has witnessed tremendous progress in the domain of
processing power enhancement and improvement in sensing capabilities and wireless …

[PDF][PDF] A Honeypot-assisted Industrial Control System to Detect Replication Attacks on Wireless Sensor Networks

A Pashaei, ME Akbari, MZ Lighvan… - Majlesi Journal of …, 2022 - mjtd.isfahan.iau.ir
Industrial Control Systems (ICSs), which work based on Wireless Sensor Networks (WSNs),
are prone to hacking and attacks. In node simulation attacks against ICS networks, the …

Deployment with Location Knowledge by Multi Area Approach for Detecting Replica Nodes in Wireless Sensor Network

SS Jacob, B Karthikeyan, T Johnpeter, R Jayamala - Tehnički vjesnik, 2024 - hrcak.srce.hr
Sažetak The Wireless Sensor Network (WSN) is important for the safety of network security.
Numerous scholars have documented fundamentally fundamental attacks of various kinds in …

Identifying Clone Nodes in Wireless Sensor Networks with Minimal Communication and Storage Capacity Requirements

C Singh, A Rana, AY Prabhakar… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
The “sensor nodes” in a wireless sensor network are the individual devices that collect data
and are powered independently. These nodes act as sensors and processors. The …

Trust and Mobility Based Clone Attack Detection in Mobile Wireless Network.

SM Mohan, R Bandara - Indian Journal of Public Health …, 2018 - search.ebscohost.com
Owing to the need of systematization individuality administration, the transmit character of
Mobile wireless network, clone attacks are forever attractive. This attacker can make …