Download now Free registration required
The general problem in Wireless Sensor Network security (WSN) is the node Clone attack. This attack, is an adversary breaks into a sensor node. Once attacker captures sensor nodes, can compromise them and launch various types of attacks with those compromised nodes. Therefore, node capture attacks should be detected as soon as possible to reduce the harm incurred by them. Some of the solutions were introduced to meet the requirements of this problem. However, these solutions are not satisfactory. A serious drawback for any protocol to be used in the WSN resource constrained environment.
- Format: PDF
- Size: 66.63 KB