Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Cho, Kwantae | - |
dc.contributor.author | Jo, Minho | - |
dc.contributor.author | Kwon, Taekyoung | - |
dc.contributor.author | Chen, Hsiao-Hwa | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-06T03:58:56Z | - |
dc.date.available | 2021-09-06T03:58:56Z | - |
dc.date.created | 2021-06-14 | - |
dc.date.issued | 2013-03 | - |
dc.identifier.issn | 1932-8184 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/103866 | - |
dc.description.abstract | Wireless sensor networks (WSNs) consist of tiny sensor nodes that communicate with each other over wireless channels, often in a hostile environment where nodes can be captured and compromised. Consequently, an adversary may launch a clone attack by replicating the captured nodes to enlarge the compromised areas employing clones. Thus, it is critical to detect clone nodes promptly for minimizing their damage to WSNs. Recently, various clone detection schemes were proposed for WSNs, considering different types of network configurations, such as device types and deployment strategies. In order to choose an effective clone detection scheme for a given sensor network, the selection criteria play an important role. In this paper, we first investigate the selection criteria of clone detection schemes with regard to device types, detection methodologies, deployment strategies, and detection ranges. We then classify the existing schemes according to the proposed criteria. Simulation experiments are conducted to compare their performances. It is concluded that it is beneficial to utilize the grid deployment knowledge for static sensor networks; the scheme using the grid deployment knowledge can save energy by up to 94.44% in comparable performance (specifically in terms of clone detection ratio and the completion time), as compared to others. On the other hand, for mobile sensor networks, no existing approach works efficiently in reducing detection error rate. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC | - |
dc.subject | REPLICA NODE ATTACKS | - |
dc.subject | KEY ESTABLISHMENT | - |
dc.subject | DISTRIBUTED DETECTION | - |
dc.subject | TIME SYNCHRONIZATION | - |
dc.subject | ARCHITECTURE | - |
dc.subject | SCHEME | - |
dc.subject | SECURE | - |
dc.title | Classification and Experimental Analysis for Clone Detection Approaches in Wireless Sensor Networks | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Jo, Minho | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1109/JSYST.2012.2188689 | - |
dc.identifier.scopusid | 2-s2.0-84874658792 | - |
dc.identifier.wosid | 000315640400004 | - |
dc.identifier.bibliographicCitation | IEEE SYSTEMS JOURNAL, v.7, no.1, pp.26 - 35 | - |
dc.relation.isPartOf | IEEE SYSTEMS JOURNAL | - |
dc.citation.title | IEEE SYSTEMS JOURNAL | - |
dc.citation.volume | 7 | - |
dc.citation.number | 1 | - |
dc.citation.startPage | 26 | - |
dc.citation.endPage | 35 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalResearchArea | Operations Research & Management Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.relation.journalWebOfScienceCategory | Operations Research & Management Science | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.subject.keywordPlus | REPLICA NODE ATTACKS | - |
dc.subject.keywordPlus | KEY ESTABLISHMENT | - |
dc.subject.keywordPlus | DISTRIBUTED DETECTION | - |
dc.subject.keywordPlus | TIME SYNCHRONIZATION | - |
dc.subject.keywordPlus | ARCHITECTURE | - |
dc.subject.keywordPlus | SCHEME | - |
dc.subject.keywordPlus | SECURE | - |
dc.subject.keywordAuthor | Clone attack | - |
dc.subject.keywordAuthor | clone detection | - |
dc.subject.keywordAuthor | network security | - |
dc.subject.keywordAuthor | replica attack | - |
dc.subject.keywordAuthor | wireless sensor networks (WSNs) | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.