2016
DOI: 10.1109/twc.2016.2516021
|View full text |Cite
|
Sign up to set email alerts
|

Compressed Sensing-Based Clone Identification in Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(7 citation statements)
references
References 39 publications
0
7
0
Order By: Relevance
“…High and successful detection probability is the most significant performance metric for any clone detection protocol. However, most of the proposed clone detection protocols suffer from low detection probability with high cost in terms of communication and memory [29], [33], [36], [38], [41], [56], [58]. This study concludes that ''Detection Probability'', with a frequency of 20.59%, can be regarded as the third-significant challenge in the clone node detection mechanism.…”
Section: ) Detection Probabilitymentioning
confidence: 88%
“…High and successful detection probability is the most significant performance metric for any clone detection protocol. However, most of the proposed clone detection protocols suffer from low detection probability with high cost in terms of communication and memory [29], [33], [36], [38], [41], [56], [58]. This study concludes that ''Detection Probability'', with a frequency of 20.59%, can be regarded as the third-significant challenge in the clone node detection mechanism.…”
Section: ) Detection Probabilitymentioning
confidence: 88%
“…Clone attacks have attracted the attention of researchers, and there has been much effort on clone detection up to now [5][6][7][8][9][10][11][12][13][14][15][16][17][18]. According to different features, we could classify them into different categories: centralized [12][13][14][15] or distributed [5][6][7][8][9][10][11][16][17][18], witness-based [5,[8][9][10][11][16][17][18] or not, position dependent [5, 8-11, 17, 18] or not, and the scheme is for randomly deployed [5][6][7][8][9][10][11][12][13][14][15][16] or group-deployed networks…”
Section: Related Workmentioning
confidence: 99%
“…The most common classification in the literature is based on centralized or distributed. For the centralized methods, the BS or sink is responsible for clone detection according to the information reported by nodes [12][13][14][15]. The advantages of these methods are that they have low overhead and high detection probability because of the comprehensive information.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations