Red Protocol for the Detection of Clone Attacks

One of the most vexing problems in wireless sensor network security is the node Clone attack. In this attack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an army of malicious nodes that can cripple the sensor network. A few distributed solutions to address this fundamental problem have been recently proposed. However, these solutions are not satisfactory. The desirable properties of a distributed mechanism for the detection of node Clone attacks have been analyzed.

Provided by: International Journal of Communications and Engineering Topic: Mobility Date Added: Mar 2012 Format: PDF

Download Now

Find By Topic