A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is
Mobile Ad-Hoc Networks (MANETs) use anonymous routing protocols that hide node identifies and/or routes from outside observers in order to provide anonymity protection. In this attack, an adversary captures few nodes, replicates them and then deploys arbitrary number of replicas throughout the network. It is very hard to distinguish between non-compromised nodes a clone node since a clone has the same security and code information of original node. Hence cloned nodes can launch a variety ofdoi:10.4066/biomedicalresearch.29-17-1404 fatcat:fbv4nyonnbhjrbfhicoq7tzpdy