Mobility

Lightweight and Effective Detection Scheme for Node Clone Attack in Wireless Sensor Networks

Free registration required

Executive Summary

Legitimate sensor nodes may be captured by an adversary to extract important security information regarding shared secrets, cryptographic keys and so on. The adversary can easily launch node clone attack, which is an attack that an adversary attempts to add one or more nodes to the network by cloning captured nodes. This kind of attack imposes a severe threat to Wireless Sensor Networks (WSNs). A novel scheme to detect the node clone attack in WSN by channel identification characteristic is presented, in which the clone nodes are distinguished by the channel responses between nodes.

  • Format: PDF
  • Size: 814.79 KB