By Topic

Lightweight and effective detection scheme for node clone attack in wireless sensor networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $33
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
H. Wen ; Nat. Key Lab. of Sci. & Technol. on Commun., UESTC, Chengdu, China ; J. Luo ; L. Zhou

Legitimate sensor nodes may be captured by an adversary to extract important security information regarding shared secrets, cryptographic keys and so on. The adversary can easily launch node clone attack, which is an attack that an adversary attempts to add one or more nodes to the network by cloning captured nodes. This kind of attack imposes a severe threat to wireless sensor networks (WSNs). A novel scheme to detect the node clone attack in WSN by channel identification characteristic is presented, in which the clone nodes are distinguished by the channel responses between nodes. The proposed scheme aims at achieving fast detection and minimising the data transmission cost by taking advantage of temporal and spatial uniqueness in physical layer channel responses. In contrast to previous solutions, the proposed approaches feature nearly-perfect resilience to node clone attack with low communication and computation costs, low memory requirements and high detection probability.

Published in:

IET Wireless Sensor Systems  (Volume:1 ,  Issue: 3 )