International Journal of Network Security
Wireless Sensor Networks (WSNs) are composed of a number of resource-constrained sensor nodes which are often deployed in unattended environments. Therefore, WSNs easily encounter a variety of physical attacks. In this paper, the authors focus on one of physical attacks known as node replication attack, where an intruder randomly captures a legitimate sensor node and collects all secret elements. Then an intruder inserts the secret element in the users malicious sensor nodes and deploys the malicious sensor nodes into the network.