@inproceedings{scholars3866, address = {Los Angeles, CA}, title = {Temporal key based randomized efficient and distributed detection of clone attack in WSNs}, note = {cited By 0; Conference of 26th International Conference on Computer Applications in Industry and Engineering, CAINE 2013 ; Conference Date: 25 September 2013 Through 27 September 2013; Conference Code:103288}, pages = {195--199}, publisher = {International Society for Computers and Their Applications}, year = {2013}, journal = {26th International Conference on Computer Applications in Industry and Engineering, CAINE 2013}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84896448541&partnerID=40&md5=be20fbe95351901cd856e852f680dfec}, abstract = {Clone Node Attack is the most perilous threat to the security of wireless sensor networks. In this attack, an adversary compromises the captured node and replicates it, creating many replicas with the same node identity by obtaining all the secrets of the nodes. After this an adversary may launch many insidious attacks within the sensor network. Recent studies have shown that Randomized, Efficient and Distributed (RED) is considered to be the most promising distributed solution for detecting clone nodes but it also has some uncompromising shortcomings. In this paper we have presented a distributed, non-deterministic solution called Temporal Key Based RED (TKRED) which removes the drawbacks of RED by making enhancements in order to identify and revoke clones. Our simulation results have shown that proposed modification makes the protocol TKRED fully distributed and the witness node selection is non-deterministic.}, keywords = {Cloning; Computer applications; Wireless sensor networks, Clone detection; Distributed detection; Distributed solutions; Node replication attack; Node selection; Security; Security of wireless sensor networks; Temporal keys, Sensor nodes}, author = {Khan, W. Z. and Aalsalem, M. Y. and Saad, N. M. and Aljahdali, S. H.}, isbn = {9781629933122} }