Home // SENSORCOMM 2013, The Seventh International Conference on Sensor Technologies and Applications // View article


The Cloning Attack Vulnerability in WSN Key Management Schemes

Authors:
Othmane Nait Hamoud
Tayeb Kenaza
Nadia Nouali-Taboudjmat

Keywords: WSNs; key management scheme; cloning attack;

Abstract:
The majority of existing key management schemes in wireless sensors networks suffer from the physically compromised of nodes. This vulnerability allows an adversary to reproduce clones from a compromised node and to inject them into several locations on the network to conduct other types of attacks. Moreover, the joining of new nodes to the network (for maintenance), which is an inevitable step to prolong its life or to correct voids, presents the best opportunity to conduct such an attack. In this paper, we review several key management schemes and we highlight their weakness regarding the cloning attack.

Pages: 151 to 156

Copyright: Copyright (c) IARIA, 2013

Publication date: August 25, 2013

Published in: conference

ISSN: 2308-4405

ISBN: 978-1-61208-296-7

Location: Barcelona, Spain

Dates: from August 25, 2013 to August 31, 2013