eprintid: 7244 rev_number: 2 eprint_status: archive userid: 1 dir: disk0/00/00/72/44 datestamp: 2023-11-09 16:19:02 lastmod: 2023-11-09 16:19:02 status_changed: 2023-11-09 16:08:51 type: conference_item metadata_visibility: show creators_name: Aalsalem, M.Y. creators_name: Khan, W.Z. creators_name: Saad, N.M. title: Detecting clones in wireless sensor networks using constrained random walk ispublished: pub keywords: Cloning; Network security; Radar; Random processes; Sensor nodes, Detection probabilities; Distributed solutions; Distributed techniques; High detection probability; Random Walk; Security; Tamper resistance; Wireless sensor network (WSNs), Wireless sensor networks note: cited By 0; Conference of 4th International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications, ICRAMET 2015 ; Conference Date: 5 October 2015 Through 7 October 2015 abstract: Wireless Sensor Networks (WSNs) are vulnerable to clone attacks as they are deployed in hostile and unattended environtments. Also due to the lack of physical tamper-resistance, an adversary can easily capture and compromise sensor nodes and after replicating them, he inserts arbitrary number of clones into network. As a result the adversary is able to mount a wide variety of internal attacks. Several solutions have been proposed in the literature for the detection of these clones from which witness node based distributed solutions have shown satisfactory results. Random Walk (RAWL) is one of the witness node based distributed techniques in which witness nodes are randomly selected by initiating several random walks throughout the network. Although RAWL has achieved high security of witness nodes but in accomplishing high detection probability RAWL suffers from very high communication and memory overhead. In this paper we propose a novel enhancement in RAWL protocol aiming to decrease the communication and memory costs while keeping the detection probability high. Our simulation results show that this improvement in RAWL not only reduces the communication and memory costs but also ensures high security of witness node. © 2015 IEEE. date: 2016 publisher: Institute of Electrical and Electronics Engineers Inc. official_url: https://www.scopus.com/inward/record.uri?eid=2-s2.0-84966658426&doi=10.1109%2fICRAMET.2015.7380774&partnerID=40&md5=3f9d1b4e18351cdd26ee6e6e58866103 id_number: 10.1109/ICRAMET.2015.7380774 full_text_status: none publication: Proceeding - 2015 International Conference on Radar, Antenna, Microwave, Electronics, and Telecommunications, ICRAMET 2015 pagerange: 55-59 refereed: TRUE isbn: 9781467394246 citation: Aalsalem, M.Y. and Khan, W.Z. and Saad, N.M. (2016) Detecting clones in wireless sensor networks using constrained random walk. In: UNSPECIFIED.