2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W) 2016
DOI: 10.1109/fas-w.2016.60
|View full text |Cite
|
Sign up to set email alerts
|

A Fog Computing Based System for Selective Forwarding Detection in Mobile Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
35
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 50 publications
(35 citation statements)
references
References 12 publications
0
35
0
Order By: Relevance
“…The paper is an extension to a previous study . This version provides complete and comprehensive details about the contribution by extending the proposed model and all sections.…”
Section: Introductionmentioning
confidence: 99%
“…The paper is an extension to a previous study . This version provides complete and comprehensive details about the contribution by extending the proposed model and all sections.…”
Section: Introductionmentioning
confidence: 99%
“…Recently, fog computing framework has been more and more popular in IoT applications [26][27][28][29]. In [30], a mobile WSN is applied to intrusion detection, and fog computing is applied to improve the network performance. A three-tier model is proposed where WSN is a bottom tier.…”
Section: Related Workmentioning
confidence: 99%
“…Because of this problem, a new MWSN detection scheme is needed. Qussai Yaseen et al proposed fog computing-based selective forwarding attack detection [6]. This technique detects selective forwarding attacks in MWSNs using fog computing and watchdog.…”
Section: B Selective Forwarding Attack Detectionmentioning
confidence: 99%
“…This attack can be seen as a threatening attack in a military or hostile environment because important packets are lost. Selective forwarding attack detection based on fog computing is a technique to detect selective forwarding attacks using a fog server and watchdog in a MWSN environment [6]. However, since a single path is used, important packets are dropped during selective forwarding attack detection.…”
Section: Introductionmentioning
confidence: 99%