International Journal of Distributed Sensor Networks
Sensor Network Self-Organization Using Random Graphs
International Journal of Distributed Sensor Networks
Clone Detection in Sensor Networks with Ad Hoc and Grid Topologies
International Journal of Distributed Sensor Networks
Random-walk based approach to detect clone attacks in wireless sensor networks
IEEE Journal on Selected Areas in Communications
From time domain to space domain: detecting replica attacks in mobile ad hoc networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
International Journal of Sensor Networks
Review: Detecting node replication attacks in wireless sensor networks: A survey
Journal of Network and Computer Applications
Wireless sensor replica detection in mobile environments
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks
International Journal of Grid and Utility Computing
Clone wars: Distributed detection of clone attacks in mobile WSNs
Journal of Computer and System Sciences
On the node clone detection in wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
Random key predistribution security schemes are well suited for use in sensor networks due to their low overhead. However, the security of a network using predistributed keys can be compromised by cloning attacks. In this attack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an army of malicious nodes that can cripple the sensor network. In this paper, we propose an algorithm that a sensor network can use to detect the presence of clones. Keys that are present on the cloned nodes are detected by looking at how often they are used to authenticate nodes in the network. Simulations verify that the proposed method accurately detects the presence of clones in the system and supports their removal. We quantify the extent of false positives and false negatives in the clone detection process.