Date Added: Jun 2012
The authors consider the problem of detecting clones in wireless mobile ad-hoc networks. They assume that one of the devices of the network has been cloned. Everything, including saved passwords, certificates and secret keys. They propose a solution in networks of mobile devices carried by individuals - composed by nodes that can communicate by short-range technology like Bluetooth or Wi-Fi, and links appear and disappear according to social relationships between users. Their idea is to use social physical contacts, securely collected by wireless personal Smartphones, as a biometric way to authenticate the owner of the device and detect the clone attack. They introduce two mechanisms: Personal Marks and Community Certificates.