Neha Malhotra1,2,*, Manju Bala3
CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5269-5284, 2022, DOI:10.32604/cmc.2022.020920
- 11 October 2021
Abstract Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility. In such attacks, an adversary accesses a few network nodes, generates replication, then inserts this replication into the network, potentially resulting in numerous internal network attacks. Most existing techniques use a central base station, which introduces several difficulties into the system due to the network's reliance on a single point, while other ways generate more overhead while jeopardising network lifetime. In this research, an intelligent double hashing-based clone node identification scheme was used, which reduces communication and memory costs while… More >