2010
DOI: 10.1007/978-3-642-11723-7_16 View full text |Buy / Rent full text
|
|

Abstract: Abstract. Wireless sensor networks are vulnerable to the node clone attack because of low-cost, resource-constrained sensor nodes, and uncontrolled environments where they are left unattended. Several distributed protocols have been proposed for detecting clone. However, some protocols rely on an implicit assumption that every node is aware of all other nodes' existence; other protocols using an geographic hash table require that nodes know the general network deployment graph. Those assumptions hardly hold fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance
0
0
0
0
0
0
8
0

Publication Types

Select...

Relationship

0
0

Authors

Journals