DocumentCode :
3104515
Title :
A survey on proficient techniques to mitigate Clone attack in wireless sensor networks
Author :
Grewal, Rubal ; Kaur, Jasleen ; Saini, Kamaljit Singh
Author_Institution :
Dept. of Comput. Sci., Chandigarh Univ., Chandigarh, India
fYear :
2015
fDate :
12-13 June 2015
Firstpage :
1148
Lastpage :
1152
Abstract :
Due to open deployment of sensor nodes in hostile environment and lack of physical shielding, sensor networks are exposed to different types of physical threats including Clone attack where an adversary physically compromises a node, extract all the credentials such as keys, identity and stored codes, make hardware replicas with the captured information and introduce them at specified positions in the network. Replica detection has become an important and challenging issue in the field of security. This paper surveys the existing schemes for clone attack detection. To conclude the paper, a comparison is shown of all the existing techniques in the literature.
Keywords :
telecommunication security; wireless sensor networks; clone attack detection; clone attack mitigation; hostile environment; physical shielding; physical threats; replica detection; wireless sensor network; Base stations; Cloning; Conferences; Protocols; Routing; Security; Wireless sensor networks; WSNs; distributed; node clone; security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Advance Computing Conference (IACC), 2015 IEEE International
Conference_Location :
Banglore
Print_ISBN :
978-1-4799-8046-8
Type :
conf
DOI :
10.1109/IADCC.2015.7154883
Filename :
7154883
Link To Document :
بازگشت