References
[1]. K. Cho, Minho Jo, T. Kwon, Hsiao-Hwa Chen, and D. H.
Lee, (2013), “Classification and experimental analysis for clone detection approaches in wireless sensor network,” in
IEEE Systems Journal, Vol. 7, No. 1, pp. 26-35.
[2]. B.Parno, A, Perrig, and V. Gligor, (2005), “Distributed
detection of node replication attacks in sensor network,” in
Proc, IEEE Symp. Security Privacy, pp. 49-63.
[3]. R. Brooks, P. Y. Govindaraju, M. Pirretti, N. Vijaykrihnan,
and M.T. Kandemir, (2007), “On the detection of clones in
sensor networks using random key predistribution,” IEEE
Trans. Syst. Man Cybern., Vol. 37, No.6,pp. 1246-1258.
[4]. K. Xing, F. Liu, X. Cheng, and D. H. C. Du, (2008), ”Realtime
detection of clone attacks in wireless sensor networks,”
in Proc. ICDCS, pp. 3-10.
[5]. M. Conti, R. Pietro, L. V. Mancini, and A. Mei, (2007), “A
randomized, efficient, and distributed protocol for the
detection of node replication attacks in wireless sensor
networks,” in Proc. ACM Int. Symp. Mobile Ad Hoc Netw.
Comput., pp. 80–89.
[6]. B. Zhu, S. Setia, S. Jajodia, S. Roy, and L. Wang, (2010),
“Localized multicast: Efficient and distributed replica
detection in large-scale sensor networks,” IEEE Trans.
Mobile Comput., Vol. 9, No. 7, pp. 913–926.
[7]. J. W. Ho, D. Liu, M. Wright, and S. K. Das, (2009),
“Distributed detection of replica node attacks with group
deployment knowledge in wireless sensor networks,” Ad
Hoc Netw., Vol. 7, No. 8, pp. 1476–1488.
[8]. J. W. Ho, M. Wright, and S. K. Das, (2009), “Fast
detection of replica node attacks in mobile sensor
networks using sequential analysis,” in Proc. IEEE Int. Conf.
Comput. Commun., pp. 1773–1781.
[9]. C. M. Yu, C. S. Lu, and S. Y. Kuo, (2008), “Mobile sensor
network resilient against node replication attacks,” in Proc.
IEEE Commun. Soc. Conf. Sensor Mesh Ad Hoc Commun.
Netw., pp. 597–599.
[10]. L. Zhang, Y. Hu, and Q. Wu, (2010), “Identity-based
threshold broadcast encryption in the standard model,”
KSII Trans. Internet Inform. Syst., Vol. 4, No. 3, pp. 400–410.
[11]. The Network Simulator, ns-2 [Online]. Available:
http://www.isi.edu/nsnam/ns
[12]. W. Du, J. Deng, Y. S. Han, S. Chen, and P. Varshney,
(2004), “A key management scheme for wireless sensor
networks using deployment knowledge,” in Proc. IEEE Int. Conf. Comput. Commun., pp. 586–597.
[13]. D. Liu, P. Ning, and W. Du, (2005), “Group-based key
pre-distribution in wireless sensor networks,” in Proc. ACM
Workshop Wirel. Security, pp. 11–20.
[14]. W. Du, L. Fang, and P. Ning, (2005), “LAD: Localization
anomaly detection for wireless sensor networks,” in Proc. IEEE IPDPS, p. 41a.
[15]. W. Du, R. Wang, and P. Ning, (2005), “An efficient
scheme for authenticating public keys in sensor networks,”
in Proc. ACM Int. Symp. Mobile Ad Hoc Netw. Comput.,
pp. 58–67.