TY - CONF A1 - Khan, W.Z. A1 - Aalsalem, M.Y. A1 - Saad, M.N.M. Y1 - 2013/// N1 - cited By 0; Conference of 2013 20th International Conference on Telecommunications, ICT 2013 ; Conference Date: 6 May 2013 Through 8 May 2013; Conference Code:104525 UR - https://www.scopus.com/inward/record.uri?eid=2-s2.0-84899027413&doi=10.1109%2fICTEL.2013.6632118&partnerID=40&md5=9cb98ced210658b276493120dc7c2b31 AV - none N2 - In the security of wireless sensor networks, node replication attack is the most critical concern. In node replication attack, an adversary compromises the captured node and replicates the node, creating many replicas with the same node identity by obtaining all the secrets of the nodes. After this an adversary may launch many insidious attacks within the sensor network. So far, Randomized, Efficient and Distributed (RED) is considered to be the most promising distributed solution for detecting clone nodes but it also has some stern, stunning and uncompromising shortcomings. The contributions of this paper are twofold. First, we have presented a distributed and non-deterministic solution, removing the drawbacks of RED by making enhancements in order to identify and revoke clones. Finally, we have proposed a method for the detection of masked replication attack which is another form or variation of Node replication attack. © 2013 IEEE. TI - Secure & robust RED (SR-RED) ID - scholars3838 PB - IEEE Computer Society KW - Cloning; Information technology; Wireless sensor networks KW - Distributed solutions; Masked Replication Attack; Node Replication Attack; Security; Security of wireless sensor networks KW - Sensor nodes CY - Casablanca ER -