Node cloning detection technique in trusted sensor network: article / Syaidahtul Badriyah Aziz

The evolution of technology in sensor node due to the transistor technology advancement enabled the emerging of diverse wireless application in human life. However, these create a much more vulnerable environment in daily life especially by the user. Wireless sensor network built of several to thous...

Full description

Saved in:
Bibliographic Details
Main Author: Aziz, Syaidahtul Badriyah
Format: Article
Language:English
Published: 2015
Online Access:https://ir.uitm.edu.my/id/eprint/105406/1/105406.pdf
https://ir.uitm.edu.my/id/eprint/105406/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The evolution of technology in sensor node due to the transistor technology advancement enabled the emerging of diverse wireless application in human life. However, these create a much more vulnerable environment in daily life especially by the user. Wireless sensor network built of several to thousands tiny nodes that are communicate to each other. The malicious acts to steal anothehparty confidential data are motivated by their different background and need. Physical attack, such as node cloning gives the adversaries another effort to steal the secret key that is used to decrypt any encrypted data by joining into the network system. There is a lot of research that tried to minimize and revoke the node clone deployed into the network system, however it exhaust the energy and memory of the sensor. For static sensor node, knowing the location of the sensor give the advantage to detect node cloning, it is small and easily implement into the sensor program. Thus increase the life span of the node.