2007
DOI: 10.1016/j.jpdc.2007.04.014
|View full text |Cite
|
Sign up to set email alerts
|

CHEMAS: Identify suspect nodes in selective forwarding attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
98
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 129 publications
(103 citation statements)
references
References 14 publications
0
98
0
Order By: Relevance
“…Figure 7 provides an example of a node that is suspect and detected by an intermediate node. First, Xiao, Yu, and Gao [48] proposed a checkpoint-based method.…”
Section: Fig 7: Suspect Nodes Identification-redrawn [48]mentioning
confidence: 99%
“…Figure 7 provides an example of a node that is suspect and detected by an intermediate node. First, Xiao, Yu, and Gao [48] proposed a checkpoint-based method.…”
Section: Fig 7: Suspect Nodes Identification-redrawn [48]mentioning
confidence: 99%
“…However, preservation of information and sensitive data is one of the biggest challenges in sensor networks [17][18][19]. Due to the high costs, the hardware of sensor nodes is relatively simple and is often unattended in hostile environment, hence prone to different kinds of attacks [20][21][22]. According to the statistics, there are over 30 kinds of attacks against the sensor network [21,23], including black attack, clone attack, selective forwarding attack, and false data injection attack [20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%
“…Due to the high costs, the hardware of sensor nodes is relatively simple and is often unattended in hostile environment, hence prone to different kinds of attacks [20][21][22]. According to the statistics, there are over 30 kinds of attacks against the sensor network [21,23], including black attack, clone attack, selective forwarding attack, and false data injection attack [20][21][22][23]. It is necessary to provide solid as well as evident solutions as countermeasures against threats in sensor networks; otherwise the application of sensor networks will be hindered [20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations