2010
DOI: 10.5120/96-205
|View full text |Cite
|
Sign up to set email alerts
|

Power Efficient Data Fusion Assurance Scheme for Sensor Network Using Silent Negative Voting

Abstract: Security is a very important issue when designing or deploying any network or protocol. The nature of large, ad-hoc, wireless sensor networks presents significant challenges in designing security schemes. One or several sensors then collect the detection results from other sensors. The collected data must be processed by the sensor to reduce the transmission burden before they are transmitted to the base station. This process is called data fusion. Data fusion Nodes will fuses the collected data from nearby se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…Multiple techniques for DFT assessment were adopted in the literature mainly the: beta distribution (Sharma et al, 2016), witnesses (Du et al, 2003) and heuristics (Hall and McMullen, 2004;Suciu et al, 2015) as depicted in Table 4. Du et al (2003), Pai and Han (2008) as well as Umashankar and Chandrasekar (2010) were based on witnesses' personal opinions for data fusion result's verification in WSNs. They assumed that the fusion result should be aproved by multiple witnesses.…”
Section: Third-level: Information Trustworthiness Based On Dft Evaluamentioning
confidence: 99%
See 2 more Smart Citations
“…Multiple techniques for DFT assessment were adopted in the literature mainly the: beta distribution (Sharma et al, 2016), witnesses (Du et al, 2003) and heuristics (Hall and McMullen, 2004;Suciu et al, 2015) as depicted in Table 4. Du et al (2003), Pai and Han (2008) as well as Umashankar and Chandrasekar (2010) were based on witnesses' personal opinions for data fusion result's verification in WSNs. They assumed that the fusion result should be aproved by multiple witnesses.…”
Section: Third-level: Information Trustworthiness Based On Dft Evaluamentioning
confidence: 99%
“…They assumed that the fusion result should be aproved by multiple witnesses. Pai and Han (2008) assumed that a witness may only vote by agree or disagree while Umashankar and Chandrasekar (2010) supposed that witnesses should only vote when an erroneous result is detected. The aim of the authors is to reduce the system's overhead by reducing the number of transmitted messages.…”
Section: Third-level: Information Trustworthiness Based On Dft Evaluamentioning
confidence: 99%
See 1 more Smart Citation
“…Multiple information sources such as sensors generate information which is collected by sink node(s), where the information fusion processes take place. These processes may include transformation, reduction, integration, or replacement [8,14,15,16]. Finally, an output is generated that is hopefully more useful than that provided by any individual information source.…”
Section: The Need For Trust-based Information Fusionmentioning
confidence: 99%
“…Information fusion phases can be applied on sensors-generated information to ensure data reliability [8,14,15,16]. Information fusion techniques can combine data from multiple data sources to increase data reliability.…”
Section: Introductionmentioning
confidence: 99%