Classification and Aanalysis of clone attack detection procedures in mobile wireless sensor networks

@inproceedings{Ansari2012ClassificationAA,
  title={Classification and Aanalysis of clone attack detection procedures in mobile wireless sensor networks},
  author={Mohammad Ansari and V. TabatabaVakily},
  year={2012}
}
In this paper, regarding accelerating development of mobile sensor nodes technology and increasing the utilization of them and alsothese networks are faced with security challenges; specially clone nodes attack, our focus is on exploiting optimum criteria of node clone intrusion detection procedures in mobile wireless sensor networks by using theoretical analysis of procedures. Since many of recommended protocols in this area have not been experimentalised and also no comprehensive study has… CONTINUE READING

References

Publications referenced by this paper.
Showing 1-10 of 51 references

MoBility-Assisted Detection Of The Replication attacks in mobile wireless sensor networks

2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications • 2010
View 4 Excerpts
Highly Influenced

A Replication Detection scheme for Sensor Networks

Wen Tao Zhu
Distributed Detection of Clone Attacks in Wireless Sensor Networks ” , IEEE Transactions on Dependable and Secure Computing • 2012

A Replication Detection scheme for Sensor Networks”,rPinrogc 0e0d i(a2 E01n1g)i n0e0e0r–in0g0

XiaoAmutihnogr et al
2012

CSI: Compressed sensing-based clone identification in sensor networks

2012 IEEE International Conference on Pervasive Computing and Communications Workshops • 2012

Single Hop Detection of Node Clone Attacks in Mobile Wireless Sensor Networks”, 2012 International Workshop on Information and Electronics Engineering (IWIEE

YanYxainaxniga
2012
View 2 Excerpts

Similar Papers

Loading similar papers…