Mobility

Red Protocol for the Detection of Clone Attacks

Free registration required

Executive Summary

One of the most vexing problems in wireless sensor network security is the node Clone attack. In this attack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node back into the sensor network. Cloning gives the adversary an easy way to build an army of malicious nodes that can cripple the sensor network. A few distributed solutions to address this fundamental problem have been recently proposed. However, these solutions are not satisfactory. The desirable properties of a distributed mechanism for the detection of node Clone attacks have been analyzed.

  • Format: PDF
  • Size: 273.46 KB