2015 Conference on Information Assurance and Cyber Security (CIACS) 2015
DOI: 10.1109/ciacs.2015.7395566
|View full text |Cite
|
Sign up to set email alerts
|

Securing mobile Wireless Sensor Networks (WSNs) against Clone Node Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Qabulio et al [36] proposed a scheme to counter the clone node attack in the WSN, irrespective of the node's location. The scheme does not use extra processing time and memory to calculate the distances between the nodes similar to its predecessor schemes, which is why it is a lightweight solution.…”
Section: Received Signal Strengthmentioning
confidence: 99%
“…Qabulio et al [36] proposed a scheme to counter the clone node attack in the WSN, irrespective of the node's location. The scheme does not use extra processing time and memory to calculate the distances between the nodes similar to its predecessor schemes, which is why it is a lightweight solution.…”
Section: Received Signal Strengthmentioning
confidence: 99%
“…This leads to scalability problem where there is a need for efficient security protocol that can deal with large scale nodes. 4) Most of the current security algorithms like µTESLA [53] and its successors [1] [2] does not take synchronization into consideration while most of the protocols are based on synchronization among the node or between the nodes and the sink node. 5) WSNs are currently used with data stream including audio and video while the current security algorithms may focus on discrete events.…”
Section: Open Research Issuesmentioning
confidence: 99%