2016
DOI: 10.21307/ijssis-2017-940
|View full text |Cite
|
Sign up to set email alerts
|

False Data Filtering in Wireless Sensor Networks

Abstract: Abstract-Wireless Sensor Networks (WSN) is often deployed in hostile environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…In this work, we used a first order radio model for energy consumption and comparison in the WSNs. Research works [14][15][16][17] present various attack types and their counter measures in en-route filtering schemes. Some interesting works exist for improving network lifetime [18][19][20][21][22][23][24] and energy efficiency [25][26][27][28][29].…”
Section: Literature Reviewmentioning
confidence: 99%
“…In this work, we used a first order radio model for energy consumption and comparison in the WSNs. Research works [14][15][16][17] present various attack types and their counter measures in en-route filtering schemes. Some interesting works exist for improving network lifetime [18][19][20][21][22][23][24] and energy efficiency [25][26][27][28][29].…”
Section: Literature Reviewmentioning
confidence: 99%
“…In References [10,20,26,27,28,29,30,31], the authors proposed their scheme to enhance network lifetime in WSNs. Reference [24] presents a countermeasure for false data filtering in WSNs. A key-indexed-based routing method [25] for filtering false event reports in WSNs is proposed.…”
Section: Related Workmentioning
confidence: 99%
“…Sensor clocks are synchronised using the energy-efficient time synchronization protocol (ETSP) [23]. Recent work [20,24,25,26,27] also highlighted countermeasures against attacks in en-route filtering with an emphasis on network lifetime. Several work focused on network lifetime extension [10,28,29,30,31], energy efficiency and network lifetime [32,33,34], and energy efficiency [35,36,37,38,39] and privacy [40,41,42] using various techniques.…”
Section: Introductionmentioning
confidence: 99%