@Article{cmc.2022.020920, AUTHOR = {Neha Malhotra, Manju Bala}, TITLE = {Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node}, JOURNAL = {Computers, Materials \& Continua}, VOLUME = {70}, YEAR = {2022}, NUMBER = {3}, PAGES = {5269--5284}, URL = {http://www.techscience.com/cmc/v70n3/44992}, ISSN = {1546-2226}, ABSTRACT = {Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility. In such attacks, an adversary accesses a few network nodes, generates replication, then inserts this replication into the network, potentially resulting in numerous internal network attacks. Most existing techniques use a central base station, which introduces several difficulties into the system due to the network's reliance on a single point, while other ways generate more overhead while jeopardising network lifetime. In this research, an intelligent double hashing-based clone node identification scheme was used, which reduces communication and memory costs while performing the clone detection procedure. The approach works in two stages: in the first, the network is deployed using an intelligent double hashing procedure to avoid any network collisions and then in the second, the clone node identification procedure searches for any clone node in the network. This first phase verifies the node prior to network deployment, and then, whenever a node wants to interact, it executes the second level of authentication. End-to-end delay, which is bound to increase owing to the injection of clone nodes, and packet loss, which is reduced by the double hashing technique, were used to evaluate the performance of the aforementioned approach.}, DOI = {10.32604/cmc.2022.020920} }