2016
DOI: 10.3390/s16111955
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Mobility-Based Control Protocol for Tolerating Clone Failures in Wireless Sensor Networks

Abstract: Nowadays, with the ubiquitous presence of the Internet of Things industry, the application of emerging sensor networks has become a focus of public attention. Unattended sensor nodes can be comprised and cloned to destroy the network topology. This paper proposes a novel distributed protocol and management technique for the detection of mobile replicas to tolerate node failures. In our scheme, sensors’ location claims are forwarded to obtain samples only when the corresponding witnesses meet. Meanwhile, sequen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 36 publications
0
2
0
Order By: Relevance
“…With this method, each node can enforce network-wide revocation of the clone nodes without overwhelming the entire network with revocation messages. Similarly to the witness finding strategy in static networks, Zhou et al [36] proposed a distributed and management technique for detecting mobile replicas that tolerates node failures by forwarding sensor node location claims to collect samples only when the relevant witnesses meet. Sequential tests based on statistical hypotheses are used to detect the cloned node in accordance with the witness nodes, significantly reducing the routeing overhead and false positive/negative rate for detection; however, this technique imposes additional computation and storage overhead on the witness node acting as the main node, collecting samples and forwarding information to the base station for detection of clone nodes.…”
Section: Related Workmentioning
confidence: 99%
“…With this method, each node can enforce network-wide revocation of the clone nodes without overwhelming the entire network with revocation messages. Similarly to the witness finding strategy in static networks, Zhou et al [36] proposed a distributed and management technique for detecting mobile replicas that tolerates node failures by forwarding sensor node location claims to collect samples only when the relevant witnesses meet. Sequential tests based on statistical hypotheses are used to detect the cloned node in accordance with the witness nodes, significantly reducing the routeing overhead and false positive/negative rate for detection; however, this technique imposes additional computation and storage overhead on the witness node acting as the main node, collecting samples and forwarding information to the base station for detection of clone nodes.…”
Section: Related Workmentioning
confidence: 99%
“…The base station receives the message and validates it by utilising a key exclusively assigned to that device [9]. Some other methods for finding the cloned node attacks include finding network witnesses [6], measuring the signal strength of devices [9], randomly picking secret keys [10], calculating trust values [11,12], managing distributed trust [13], localization algorithms [14] and multi-dimensional scaling [15]. A detailed analysis of existing schemes based on wireless sensor networks, IoT, and mobile ad-hoc networks for detecting clone node attacks is summarised here [16].…”
Section: Introductionmentioning
confidence: 99%