Security

The Cloning Attack Vulnerability in WSN Key Management Schemes

Download Now Free registration required

Executive Summary

The majority of existing key management schemes in wireless sensors networks suffer from the physically compromised of nodes. This vulnerability allows an adversary to reproduce clones from a compromised node and to inject them into several locations on the network to conduct other types of attacks. Moreover, the joining of new nodes to the network (for maintenance), which is an inevitable step to prolong its life or to correct voids, presents the best opportunity to conduct such an attack. In this paper, the authors review several key management schemes and they highlight their weakness regarding the cloning attack.

  • Format: PDF
  • Size: 714.1 KB