Node Replication Attack
It is quite simple attack. An attacker copies the node ID of an existing sensor node and adds to an existing sensor network. With node replication approach a sensor network’s performance can severely disrupt. Packets can be corrupted or even misrouted. As a result this can form a disconnect network, false sensor reading etc. An attacker can copy cryptographic keys to the replicated sensors by physical accessing to the entire network. The attacker could easily manipulate a specific segment of the network by inserting the replicated nodes at specific network points, perhaps by disconnecting it altogether.