2010
DOI: 10.1587/transcom.e93.b.1881
|View full text |Cite
|
Sign up to set email alerts
|

A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
35
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 15 publications
(35 citation statements)
references
References 11 publications
0
35
0
Order By: Relevance
“…In general, the average velocity of each type of objects can be estimated. It is not easy to make non-existing objects moving using a few compromised nodes, so that objects moving very slowly could be a signature of FDIAs [4].…”
Section: Fuzzy-based Adaptive Countering Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…In general, the average velocity of each type of objects can be estimated. It is not easy to make non-existing objects moving using a few compromised nodes, so that objects moving very slowly could be a signature of FDIAs [4].…”
Section: Fuzzy-based Adaptive Countering Methodsmentioning
confidence: 99%
“…Compared to ACS [4], the method can reduce space complexity as well as the detection errors. Moreover, it can be optimized by GAOM, so that the users need not to determine threshold parameters for the detection.…”
Section: Fuzzy-based Adaptive Countering Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…The technology of the sensor network easily and conveniently provides diverse information to users. However, the sensor network has the greatest probability of being captured and compromised because it operates in an open environment [3,4]. In addition, the sensor node is readily exposed to diverse attack patterns from malicious attackers.…”
Section: Introductionmentioning
confidence: 99%