2018
DOI: 10.1109/tsipn.2018.2790164
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Good and Bad Sensor Nodes in the Presence of Malicious Attacks and Its Application to Data Aggregation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 33 publications
0
8
0
Order By: Relevance
“…This work avoids sending packets from redundant nodes which reduces network traffic greatly. In [26], proposed a local outlier factor (LOF) algorithm which classifies the sensor readings into reliable and unreliable readings. However, this LOF method was not suitable for the large-scale network as it increases the time consumption at every cluster.…”
Section: IImentioning
confidence: 99%
See 2 more Smart Citations
“…This work avoids sending packets from redundant nodes which reduces network traffic greatly. In [26], proposed a local outlier factor (LOF) algorithm which classifies the sensor readings into reliable and unreliable readings. However, this LOF method was not suitable for the large-scale network as it increases the time consumption at every cluster.…”
Section: IImentioning
confidence: 99%
“…Hence, there must be an end-to-end encrypted and redundant data elimination process over the encrypted (no needs to decrypt for redundant elimination) packets that need to be proposed to maintain end-to-end security. On the other hand, the WSN security-oriented literature such as fuzzy-based biometric schema [32], Okamoto-Uchiyama [25], and elliptic curve cryptography (ECC) [26] required high computational power were not suitable for energy-constrained WSN. Hence, a lightweight and secure encryption method must be identified to best suit the resource-constrained WSN.…”
Section: A Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…Kernel principal component analysis based Mahalanobis kernel is yet another outlier detection method that has been applied in [7]. In [21], the authors used Local Outlier Factor (LOF) algorithm to segregate normal nodes from anomalous ones. Based on density-based spatial clustering of applications with noise (DBSCAN), Abid et.…”
Section: Related Studiesmentioning
confidence: 99%
“…For a selective forwarding attack, a malicious node detection algorithm based on a triangle module fusion operator (MDTMO) (Yessembayev, 2018) is suggested. After the base station node receives the warning information, the monitoring node will then alert the base station node, further verifying whether the packet loss is caused by network congestion or attack.…”
Section: Introductionmentioning
confidence: 99%