Home // SENSORCOMM 2013, The Seventh International Conference on Sensor Technologies and Applications // View article
The Cloning Attack Vulnerability in WSN Key Management Schemes
Authors:
Othmane Nait Hamoud
Tayeb Kenaza
Nadia Nouali-Taboudjmat
Keywords: WSNs; key management scheme; cloning attack;
Abstract:
The majority of existing key management schemes in wireless sensors networks suffer from the physically compromised of nodes. This vulnerability allows an adversary to reproduce clones from a compromised node and to inject them into several locations on the network to conduct other types of attacks. Moreover, the joining of new nodes to the network (for maintenance), which is an inevitable step to prolong its life or to correct voids, presents the best opportunity to conduct such an attack. In this paper, we review several key management schemes and we highlight their weakness regarding the cloning attack.
Pages: 151 to 156
Copyright: Copyright (c) IARIA, 2013
Publication date: August 25, 2013
Published in: conference
ISSN: 2308-4405
ISBN: 978-1-61208-296-7
Location: Barcelona, Spain
Dates: from August 25, 2013 to August 31, 2013