@article{scholars3946, note = {cited By 14}, pages = {119--127}, year = {2013}, title = {Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks}, journal = {International Journal of Grid and Utility Computing}, number = {2-3}, doi = {10.1504/IJGUC.2013.056247}, volume = {4}, publisher = {Inderscience Publishers}, abstract = {Wireless Sensor Networks (WSNs) are often deployed in unattended environments where an adversary can easily physically capture and compromise sensor nodes. She then creates replicas of the compromised nodes instigating further attacks by spreading these replicas over the network, incurring serious damages to the network, so these replicas should be detected as early as possible. Most of the previous research efforts on detecting replica node attacks adopt static network models which are not suitable for mobile WSNs. In mobile WSN, sensor nodes are freely and randomly roaming all the time and they do not have any fixed neighbour to communicate with because these mobile nodes meet with one another occasionally and in an unpredictable manner. In this paper, we have surveyed all the existing solutions proposed so far for the detection of replica or clone nodes in mobile WSN by comparing them comprehensively and pointing out their drawbacks and shortcomings. Copyright {\^A}{\copyright} 2013 Inderscience Enterprises Ltd.}, keywords = {Cloning; Damage detection, Compromised nodes; Mobile sensor networks; Mobile wireless sensor network; Node replication attack; Research efforts; Security; Static networks; Wireless sensor network (WSNs), Sensor nodes}, url = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883567591&doi=10.1504\%2fIJGUC.2013.056247&partnerID=40&md5=e9d14ac260ff88f30c858ce6ff10e43a}, issn = {1741847X}, author = {Khan, W. Z. and Saad, M. N. B. M. and Aalsalem, M. Y.} }