Temporal key based randomized efficient and distributed detection of clone attack in WSNs
Clone Node Attack is the most perilous threat to the security of wireless sensor networks. In this attack, an adversary compromises the captured node and replicates it, creating many replicas with the same node identity by obtaining all the secrets of the nodes. After this an adversary may launch ma...
Saved in:
| Main Authors: | Khan, W.Z., Aalsalem, M.Y., Saad, N.M., Aljahdali, S.H. |
|---|---|
| Format: | Conference or Workshop Item |
| Institution: | Universiti Teknologi Petronas |
| Record Id / ISBN-0: | utp-eprints.32900 / |
| Published: |
International Society for Computers and Their Applications
2013
|
| Online Access: |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84896448541&partnerID=40&md5=be20fbe95351901cd856e852f680dfec http://eprints.utp.edu.my/32900/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Distributed clone detection in static Wireless Sensor Networks: Random Walk with Network Division
by: Khan, W.Z., et al.
Published: (2015) -
Detecting clones in wireless sensor networks using Single Stage Memory Random Walk with Network Division
by: Khan, W.Z., et al.
Published: (2015) -
Detection of masked replication attack in wireless sensor networks
by: Khan, W.Z., et al.
Published: (2013) -
Detection of masked replication attack in wireless sensor networks
by: Khan, W.Z., et al.
Published: (2013) -
Detection of masked replication attack in wireless sensor networks
by: Khan, W.Z., et al.
Published: (2013)