Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1)
  • Open Access

    ARTICLE

    Intelligent Multilevel Node Authentication in Mobile Computing Using Clone Node

    Neha Malhotra1,2,*, Manju Bala3

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5269-5284, 2022, DOI:10.32604/cmc.2022.020920 - 11 October 2021

    Abstract Nodes in a mobile computing system are vulnerable to clone attacks due to their mobility. In such attacks, an adversary accesses a few network nodes, generates replication, then inserts this replication into the network, potentially resulting in numerous internal network attacks. Most existing techniques use a central base station, which introduces several difficulties into the system due to the network's reliance on a single point, while other ways generate more overhead while jeopardising network lifetime. In this research, an intelligent double hashing-based clone node identification scheme was used, which reduces communication and memory costs while… More >

Displaying 1-10 on page 1 of 1. Per Page