2020
DOI: 10.3390/s20082283
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN)

Abstract: Wireless sensor networks (WSNs) are often deployed in hostile environments, where an adversary can physically capture some of the sensor nodes. The adversary collects all the nodes’ important credentials and subsequently replicate the nodes, which may expose the network to a number of other security attacks, and eventually compromise the entire network. This harmful attack where a single or more nodes illegitimately claims an identity as replicas is known as the node replication attack. The problem of node rep… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 19 publications
(12 citation statements)
references
References 29 publications
0
10
0
Order By: Relevance
“…To bridge the gap between the customer and the grid, the best possible solution, as suggested by [ 3 ], is to group the customers with similar electric usage behavior. The clustering approach and hybrid concept are interesting, as mentioned in paper [ 22 ] with the concept of the danger theory. To identify the users who are consuming the same amount of energy or, in other words, check their likelihood, those who have the same pattern will be combined.…”
Section: Proposed Methods and Materialsmentioning
confidence: 99%
“…To bridge the gap between the customer and the grid, the best possible solution, as suggested by [ 3 ], is to group the customers with similar electric usage behavior. The clustering approach and hybrid concept are interesting, as mentioned in paper [ 22 ] with the concept of the danger theory. To identify the users who are consuming the same amount of energy or, in other words, check their likelihood, those who have the same pattern will be combined.…”
Section: Proposed Methods and Materialsmentioning
confidence: 99%
“…This reduces when the number of dead nodes decreases to 10. The existing routing algorithm called Hybrid Multi-Level Clustering (HMLC) algorithm [11] produces next highest time delay. Time delay further reduces with the existing HMLC algorithm by avoiding clone attack.…”
Section: Resultsmentioning
confidence: 99%
“…Shaukat et al [11] has proposed a scheme in which hybrid multi-level detection was performed for the identification of clone attack. The proposed algorithm was based on the concept of danger theory.…”
Section: Literature Surveymentioning
confidence: 99%
“…Regarding electronic devices, they take samples and report the behavior of environment variables or of the individuals for whom these variables were created. In both instances, problems arise in terms of access conditions to power grids or communications networks [ 205 , 206 ], and especially for wireless sensors, which, in general, exhibit decreased processing resources, battery autonomy, wireless range or security [ 207 ]. These constraints contrast with the demands for resources needed when applying machine learning techniques, which implies that identifying computationally efficient strategies is an essential component.…”
Section: Discussionmentioning
confidence: 99%