2010
DOI: 10.1109/jsac.2010.100606
|View full text |Cite
|
Sign up to set email alerts
|

Random-walk based approach to detect clone attacks in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
105
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 107 publications
(105 citation statements)
references
References 29 publications
0
105
0
Order By: Relevance
“…If any witness receives different location claims for a same node ID. This will result in the detection of the replicated node [23].…”
Section: Random Walk Based Protocols 4291 Random Walk (Rawl)mentioning
confidence: 99%
See 3 more Smart Citations
“…If any witness receives different location claims for a same node ID. This will result in the detection of the replicated node [23].…”
Section: Random Walk Based Protocols 4291 Random Walk (Rawl)mentioning
confidence: 99%
“…Then if any entry is found, the node will compute the digest of the claim and compare the digest with the digest in the entry. When two digest are different, the node detects a clone attack [23].…”
Section: Table Assisted Random Walk (Trawl)mentioning
confidence: 99%
See 2 more Smart Citations
“…It achieves higher detection rates and lower storage overheads than the line-selected multicast scheme of [6]. Zeng et al [10] proposed a random-walk based replica node detection scheme. This scheme uses random walks as the distribution mechanism of location claims in the network.…”
Section: Related Workmentioning
confidence: 99%