2015
DOI: 10.1016/j.adhoc.2015.03.005
|View full text |Cite
|
Sign up to set email alerts
|

A fuzzy rule-based path configuration method for LEAP in sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(21 citation statements)
references
References 47 publications
0
21
0
Order By: Relevance
“…Each report is 36 bytes and each MAC is 4 bytes in size. It takes a verification node 75 µJ of energy to verify a report [48,57]. As illustrated in Figure 3, our suggested method's capability to detect false votes early during the process of verification is better than that of the PVFS.…”
Section: Simulation Resultsmentioning
confidence: 98%
See 2 more Smart Citations
“…Each report is 36 bytes and each MAC is 4 bytes in size. It takes a verification node 75 µJ of energy to verify a report [48,57]. As illustrated in Figure 3, our suggested method's capability to detect false votes early during the process of verification is better than that of the PVFS.…”
Section: Simulation Resultsmentioning
confidence: 98%
“…Use of fuzzy logic is appropriate for achieving near optimization in data routing in cluster-based WSNs. Fuzzy logic is the ultimate choice for the optimization of filtering node and data-forwarding route selection due to the simplicity of the fuzzy membership functions [11,48].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the node is easily exposed to various attacks, such as environmental damage, as well as physical capture or false report injection attacks and selective forwarding attacks from malicious attackers. Hence, security research that considers the limited resources of these nodes is needed and has been investigated recently [6][7][8].…”
Section: …………………………………………………………………………………………………… Introduction:-mentioning
confidence: 99%
“…Therefore, the node is easily exposed to various attacks, such as environmental damage, as well as physical capture or false report injection attacks and selective forwarding attacks from malicious attackers. Hence, security research that considers the limited resources of these nodes is needed and has been investigated recently [6][7][8].In a WSN, an attacker can attempt to cause false alarms at the BS by injecting false event data and depleting the limited energy resources of the nodes by forcing them to forward false reports. Therefore, it is very important to detect a false report injection attack as early as possible.…”
mentioning
confidence: 99%