PMID- 32316487 OWN - NLM STAT- PubMed-not-MEDLINE DCOM- 20200423 LR - 20200523 IS - 1424-8220 (Electronic) IS - 1424-8220 (Linking) VI - 20 IP - 8 DP - 2020 Apr 17 TI - Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN). LID - 10.3390/s20082283 [doi] LID - 2283 AB - Wireless sensor networks (WSNs) are often deployed in hostile environments, where an adversary can physically capture some of the sensor nodes. The adversary collects all the nodes' important credentials and subsequently replicate the nodes, which may expose the network to a number of other security attacks, and eventually compromise the entire network. This harmful attack where a single or more nodes illegitimately claims an identity as replicas is known as the node replication attack. The problem of node replication attack can be further aggravated due to the mobile nature in WSN. In this paper, we propose an extended version of multi-level replica detection technique built on Danger Theory (DT), which utilizes a hybrid approach (centralized and distributed) to shield the mobile wireless sensor networks (MWSNs) from clone attacks. The danger theory concept depends on a multi-level of detections; first stage (highlights the danger zone (DZ) by checking the abnormal behavior of mobile nodes), second stage (battery check and random number) and third stage (inform about replica to other networks). The DT method performance is highlighted through security parameters such as false negative, energy, detection time, communication overhead and delay in detection. The proposed approach also demonstrates that the hybrid DT method is capable and successful in detecting and mitigating any malicious activities initiated by the replica. Nowadays, crimes are vastly increasing and it is crucial to modify the systems accordingly. Indeed, it is understood that the communication needs to be secured by keen observation at each level of detection. The simulation results show that the proposed approach overcomes the weaknesses of the previous and existing centralized and distributed approaches and enhances the performance of MWSN in terms of communication and memory overhead. FAU - Shaukat, Haafizah Rameeza AU - Shaukat HR AUID- ORCID: 0000-0001-6774-6139 AD - Department of Computer and Communication Systems Engineering, Universiti Putra Malaysia, Selangor 43400, Malaysia. FAU - Hashim, Fazirulhisyam AU - Hashim F AUID- ORCID: 0000-0003-1880-5643 AD - Department of Computer and Communication Systems Engineering, Universiti Putra Malaysia, Selangor 43400, Malaysia. FAU - Shaukat, Muhammad Arslan AU - Shaukat MA AUID- ORCID: 0000-0003-1693-9445 AD - School of Engineering and Information Technology, University of Technology Sydney, Sydney 2007, Australia. FAU - Ali Alezabi, Kamal AU - Ali Alezabi K AUID- ORCID: 0000-0002-5957-0732 AD - School of Information Technology, FoBIS, UCSI University, Kula Lumpur 56000, Malaysia. LA - eng PT - Journal Article DEP - 20200417 PL - Switzerland TA - Sensors (Basel) JT - Sensors (Basel, Switzerland) JID - 101204366 SB - IM PMC - PMC7219091 OTO - NOTNLM OT - danger theory OT - danger zone OT - hybrid OT - mobile wireless sensor network OT - node replication attack OT - wireless sensor network COIS- The authors declare no conflict of interest. EDAT- 2020/04/23 06:00 MHDA- 2020/04/23 06:01 PMCR- 2020/04/01 CRDT- 2020/04/23 06:00 PHST- 2020/01/10 00:00 [received] PHST- 2020/01/30 00:00 [revised] PHST- 2020/02/06 00:00 [accepted] PHST- 2020/04/23 06:00 [entrez] PHST- 2020/04/23 06:00 [pubmed] PHST- 2020/04/23 06:01 [medline] PHST- 2020/04/01 00:00 [pmc-release] AID - s20082283 [pii] AID - sensors-20-02283 [pii] AID - 10.3390/s20082283 [doi] PST - epublish SO - Sensors (Basel). 2020 Apr 17;20(8):2283. doi: 10.3390/s20082283.