{"id":"https://openalex.org/W3201889285","doi":"https://doi.org/10.3390/jcp1040028","title":"Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks","display_name":"Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks","publication_year":2021,"publication_date":"2021-09-24","ids":{"openalex":"https://openalex.org/W3201889285","doi":"https://doi.org/10.3390/jcp1040028","mag":"3201889285"},"language":"en","primary_location":{"id":"doi:10.3390/jcp1040028","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1040028","pdf_url":"https://www.mdpi.com/2624-800X/1/4/28/pdf?version=1632497228","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2624-800X/1/4/28/pdf?version=1632497228","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071767378","display_name":"Jean Rosemond Dora","orcid":null},"institutions":[{"id":"https://openalex.org/I207624831","display_name":"Slovak Academy of Sciences","ror":"https://ror.org/03h7qq074","country_code":"SK","type":"government","lineage":["https://openalex.org/I207624831"]}],"countries":["SK"],"is_corresponding":true,"raw_author_name":"Jean Rosemond Dora","raw_affiliation_strings":["Institute of Mathematics, Slovak Academy of Sciences (MUSAV), \u0160tefanikov\u00e1 49, 811 04 Bratislava, Slovakia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Institute of Mathematics, Slovak Academy of Sciences (MUSAV), \u0160tefanikov\u00e1 49, 811 04 Bratislava, Slovakia","institution_ids":["https://openalex.org/I207624831"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029199221","display_name":"Karol Nemoga","orcid":"https://orcid.org/0000-0002-4613-1765"},"institutions":[{"id":"https://openalex.org/I207624831","display_name":"Slovak Academy of Sciences","ror":"https://ror.org/03h7qq074","country_code":"SK","type":"government","lineage":["https://openalex.org/I207624831"]}],"countries":["SK"],"is_corresponding":false,"raw_author_name":"Karol Nemoga","raw_affiliation_strings":["Institute of Mathematics, Slovak Academy of Sciences (MUSAV), \u0160tefanikov\u00e1 49, 811 04 Bratislava, Slovakia"],"raw_orcid":"https://orcid.org/0000-0002-4613-1765","affiliations":[{"raw_affiliation_string":"Institute of Mathematics, Slovak Academy of Sciences (MUSAV), \u0160tefanikov\u00e1 49, 811 04 Bratislava, Slovakia","institution_ids":["https://openalex.org/I207624831"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5071767378"],"corresponding_institution_ids":["https://openalex.org/I207624831"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":1.281,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.81442542,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"1","issue":"4","first_page":"553","last_page":"579"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9835000038146973,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7630722522735596},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.719428300857544},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6742817759513855},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6053867340087891},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6043325662612915},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.5730657577514648},{"id":"https://openalex.org/keywords/replication","display_name":"Replication (statistics)","score":0.5637056231498718},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5033301711082458},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.4298282861709595},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.37860965728759766},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.3172919750213623},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.16342049837112427},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.120830237865448}],"concepts":[{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7630722522735596},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.719428300857544},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6742817759513855},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6053867340087891},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6043325662612915},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.5730657577514648},{"id":"https://openalex.org/C12590798","wikidata":"https://www.wikidata.org/wiki/Q3933199","display_name":"Replication (statistics)","level":2,"score":0.5637056231498718},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5033301711082458},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.4298282861709595},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.37860965728759766},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3172919750213623},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.16342049837112427},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.120830237865448},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/jcp1040028","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1040028","pdf_url":"https://www.mdpi.com/2624-800X/1/4/28/pdf?version=1632497228","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:742d8c281fa7468b8a016d7f61c248cb","is_oa":true,"landing_page_url":"https://doaj.org/article/742d8c281fa7468b8a016d7f61c248cb","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 1, Iss 4, Pp 553-579 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/jcp1040028","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp1040028","pdf_url":"https://www.mdpi.com/2624-800X/1/4/28/pdf?version=1632497228","source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7452145461","display_name":null,"funder_award_id":"Slovak Academy of Sciences (MUSAV), Grant VEGA 2/0109/18 and APVV-19-0220","funder_id":"https://openalex.org/F4320312330","funder_display_name":"Slovensk\u00e1 Akad\u00e9mia Vied"}],"funders":[{"id":"https://openalex.org/F4320312330","display_name":"Slovensk\u00e1 Akad\u00e9mia Vied","ror":"https://ror.org/03h7qq074"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3201889285.pdf","grobid_xml":"https://content.openalex.org/works/W3201889285.grobid-xml"},"referenced_works_count":64,"referenced_works":["https://openalex.org/W179274243","https://openalex.org/W240438309","https://openalex.org/W1554309413","https://openalex.org/W1559596490","https://openalex.org/W1766040555","https://openalex.org/W1797826844","https://openalex.org/W1922615913","https://openalex.org/W1940397557","https://openalex.org/W1980394565","https://openalex.org/W1983071987","https://openalex.org/W1988249659","https://openalex.org/W2010095508","https://openalex.org/W2030681072","https://openalex.org/W2058236247","https://openalex.org/W2058410962","https://openalex.org/W2064854566","https://openalex.org/W2066479967","https://openalex.org/W2073828460","https://openalex.org/W2075557503","https://openalex.org/W2097157480","https://openalex.org/W2098009004","https://openalex.org/W2120547470","https://openalex.org/W2128850455","https://openalex.org/W2135292154","https://openalex.org/W2136236364","https://openalex.org/W2138871086","https://openalex.org/W2149152089","https://openalex.org/W2161864928","https://openalex.org/W2162680392","https://openalex.org/W2164060122","https://openalex.org/W2174523260","https://openalex.org/W2239164392","https://openalex.org/W2288230700","https://openalex.org/W2288523697","https://openalex.org/W2316526397","https://openalex.org/W2334019504","https://openalex.org/W2361979762","https://openalex.org/W2469880262","https://openalex.org/W2508421580","https://openalex.org/W2546469155","https://openalex.org/W2609131780","https://openalex.org/W2777677181","https://openalex.org/W2787007747","https://openalex.org/W2791118858","https://openalex.org/W2807960206","https://openalex.org/W2906171730","https://openalex.org/W2920984466","https://openalex.org/W2923278775","https://openalex.org/W2956725935","https://openalex.org/W3003565393","https://openalex.org/W3010641675","https://openalex.org/W3013579342","https://openalex.org/W3016741176","https://openalex.org/W3037326989","https://openalex.org/W3084862979","https://openalex.org/W3106476843","https://openalex.org/W3120532147","https://openalex.org/W3124133420","https://openalex.org/W3128111279","https://openalex.org/W3129088219","https://openalex.org/W3146292709","https://openalex.org/W3164227701","https://openalex.org/W3167883572","https://openalex.org/W6728987465"],"related_works":["https://openalex.org/W4388150944","https://openalex.org/W4242235492","https://openalex.org/W2367268135","https://openalex.org/W1480190076","https://openalex.org/W4237162029","https://openalex.org/W4205713785","https://openalex.org/W2385701518","https://openalex.org/W3016766501","https://openalex.org/W2901033488","https://openalex.org/W4237464767"],"abstract_inverted_index":{"The":[0,45,111],"development":[1],"of":[2,18,30,35,150,161,171,193,202,222,260,269],"the":[3,23,36,43,78,115,142,151,156,162,182,194,209,217,227,256,261,267],"wireless":[4],"sensor":[5,31,57,117],"networks":[6],"technology":[7],"commonly":[8],"named":[9],"WSNs":[10,82],"has":[11],"been":[12,198],"gaining":[13],"a":[14,54,134,178,188,200],"significantly":[15],"increased":[16],"amount":[17],"attention":[19],"from":[20],"researchers":[21,175],"over":[22],"last":[24],"few":[25],"decades.":[26],"Its":[27],"large":[28],"number":[29],"nodes":[32,58],"is":[33,80,170],"one":[34],"features":[37],"that":[38,81,160,196],"makes":[39,99],"it":[40,169],"beneficial":[41],"to":[42,52,103,144,147,176,207,215],"technology.":[44],"sensors":[46],"can":[47,113,251],"communicate":[48],"with":[49],"each":[50],"other":[51],"form":[53],"network.":[55],"These":[56],"are":[59,83],"generally":[60],"used":[61,254],"for":[62,174,181,241,255],"diverse":[63],"applications,":[64],"such":[65,127],"as":[66,128,159,185,187],"pressure":[67],"monitoring,":[68,75],"fire":[69],"detection,":[70],"target":[71],"tracking,":[72],"and":[73,121,132,154,213,258],"health":[74],"etc.":[76],"However,":[77,219],"downside":[79],"often":[84],"deployed":[85],"in":[86,244],"hostile,":[87],"critical":[88],"environments":[89],"where":[90],"they":[91],"do":[92],"not":[93],"restrain":[94],"physical":[95],"access.":[96],"This":[97,137],"reality":[98],"them":[100,120,203,223],"incredibly":[101],"vulnerable":[102],"clone":[104,183,210],"node":[105,108,129,211],"attacks":[106,184,212,262],"or":[107],"replication":[109,135],"attacks.":[110,218],"adversary":[112],"capture":[114],"legitimate":[116],"nodes,":[118],"extract":[119],"then":[122],"collect":[123],"some":[124,205],"sensitive":[125],"information,":[126],"ID,":[130],"keys":[131],"perform":[133],"attack.":[136],"possibility":[138],"will":[139],"afterward":[140],"facilitate":[141],"attacker":[143],"be":[145,253],"able":[146],"take":[148],"control":[149],"whole":[152],"network":[153],"execute":[155],"same":[157],"functions":[158],"authorized":[163],"nodes.":[164],"Based":[165,231],"on":[166,226,232],"this":[167,233],"vulnerability,":[168],"great":[172],"importance":[173,268],"invent":[177],"detection":[179,257],"protocol":[180],"well":[186],"mitigation":[189,259],"method.":[190],"From":[191],"all":[192],"researches":[195],"have":[197],"published,":[199],"lot":[201],"proposed":[204,236],"techniques":[206],"detect":[208],"also":[214],"mitigate":[216],"almost":[220],"none":[221],"semantically":[224,252],"focused":[225],"security":[228,271],"layer":[229],"establishment.":[230],"fact,":[234],"we":[235],"an":[237],"ontology-based":[238],"approach":[239],"Ontology":[240],"Replication":[242],"Attacks":[243],"Static":[245],"Wireless":[246],"Sensor":[247],"Networks":[248],"\u201cORASWSN\u201d,":[249],"which":[250],"by":[263],"taking":[264],"into":[265],"consideration":[266],"using":[270],"layers.":[272]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2021-10-11T00:00:00"}
