2010
DOI: 10.1007/978-3-642-13365-7_13
|View full text |Cite
|
Sign up to set email alerts
|

Fuzzy-Based Detection of Injected False Data in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2012
2012
2021
2021

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Based on four factors, a fuzzy system determines FDIAs as well as the most appropriate countermeasures. Compared to the existing solutions [6], [7], the method can reduce the detection error and space complexity. Also, manual parameter settings are not required since the fuzzy system can be automatically optimized.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Based on four factors, a fuzzy system determines FDIAs as well as the most appropriate countermeasures. Compared to the existing solutions [6], [7], the method can reduce the detection error and space complexity. Also, manual parameter settings are not required since the fuzzy system can be automatically optimized.…”
Section: Discussionmentioning
confidence: 99%
“…Moreover, it can be optimized by GAOM, so that the users need not to determine threshold parameters for the detection. Compared to FFD [6], the method can enhance the detection power slightly. Moreover, it can provide the ability to adaptively counter the detected FDIAs.…”
Section: Fuzzy-based Adaptive Countering Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The vast majority of the research focusing FDIA has been conducted in the smart-grid and WSN field. In particular within power-grid state estimation, mainly for FDIA filtering and detection [Mo et al, 2010, Manandhar et al, 2014, Lee et al, 2010.…”
Section: False Data Injection Attackmentioning
confidence: 99%
“…Fortunately, major research efforts [2,4,5,[7][8][9][10][11] have been made to alleviate the severe damage caused by the former type of security attack, which is called a false data injection attack (FDIA). However, relatively less research [6,[12][13][14][15] has focused on investigations of countermeasures to combat the latter type of security attack, which is called a false endorsement insertion attack (FEIA).…”
Section: Introductionmentioning
confidence: 99%