2012
DOI: 10.1109/tpds.2011.217
|View full text |Cite
|
Sign up to set email alerts
|

Grouping-Enhanced Resilient Probabilistic En-Route Filtering of Injected False Data in WSNs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 15 publications
0
6
0
Order By: Relevance
“…En-route filtering is an effective mechanism to address the false data injection problem, with which, the forwarding nodes can detect and drop false reports early. Recently, many en-route filtering schemes [14][15][16][17][18][19][20][21][22][23][24] have been proposed which can be classified into two major categories: symmetric cryptography based schemes and asymmetric cryptography based schemes. Asymmetric cryptography based schemes (e.g., CCEF [14], LTE [15], PDF [16], DAEF [17], and ERF [18]) are generally more resilient to adversaries, however, symmetric cryptography based schemes are more efficient in terms of communication overhead, computation overhead, and storage overhead.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…En-route filtering is an effective mechanism to address the false data injection problem, with which, the forwarding nodes can detect and drop false reports early. Recently, many en-route filtering schemes [14][15][16][17][18][19][20][21][22][23][24] have been proposed which can be classified into two major categories: symmetric cryptography based schemes and asymmetric cryptography based schemes. Asymmetric cryptography based schemes (e.g., CCEF [14], LTE [15], PDF [16], DAEF [17], and ERF [18]) are generally more resilient to adversaries, however, symmetric cryptography based schemes are more efficient in terms of communication overhead, computation overhead, and storage overhead.…”
Section: Related Workmentioning
confidence: 99%
“…Asymmetric cryptography based schemes (e.g., CCEF [14], LTE [15], PDF [16], DAEF [17], and ERF [18]) are generally more resilient to adversaries, however, symmetric cryptography based schemes are more efficient in terms of communication overhead, computation overhead, and storage overhead. Therefore, symmetric cryptography based techniques have attracted huge attention, and large amount of work has been done in recent time, such as SEF [19], DEFS [20], GRPEF [21], BECAN [22], GFFS [23], NFFS [23], and DSF [24].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations