Abstract

Legitimate sensor nodes may be captured by an adversary to extract important security information regarding shared secrets, cryptographic keys and so on. The adversary can easily launch node clone attack, which is an attack that an adversary attempts to add one or more nodes to the network by cloning captured nodes. This kind of attack imposes a severe threat to wireless sensor networks (WSNs). A novel scheme to detect the node clone attack in WSN by channel identification characteristic is presented, in which the clone nodes are distinguished by the channel responses between nodes. The proposed scheme aims at achieving fast detection and minimising the data transmission cost by taking advantage of temporal and spatial uniqueness in physical layer channel responses. In contrast to previous solutions, the proposed approaches feature nearly-perfect resilience to node clone attack with low communication and computation costs, low memory requirements and high detection probability.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.