International Journal on Computer Science and Technology (IJCST)
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attacks by replicating the compromised node, distributing the clones throughout the network, and starting a variety of insider attacks. In this paper, the authors consider fingerprint generation. The fingerprint verification is conducted at both the base station and the neighboring sensors, which ensures a high detection probability. In this paper, they are extending this approach by introducing new enhancement called Alias Detection Mode (ADM), their system extends the fingerprint generation, which maintains the node behavior which maintains the node sensitivity by specifying automatic range values determined by the network modulation at the node creation.