2017
DOI: 10.1109/tnet.2017.2713530
|View full text |Cite
|
Sign up to set email alerts
|

ROSE: Robustness Strategy for Scale-Free Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
77
0
1

Year Published

2017
2017
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 160 publications
(78 citation statements)
references
References 37 publications
0
77
0
1
Order By: Relevance
“…In deep crowd sensing (DCS), there are more detailed requests for the data collection [33][34][35][36][37][38]. First of all, in this aspect of data quality, the demand of sensing data in target area is , which means that the application is of high quality if the collected data is not less than .…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…In deep crowd sensing (DCS), there are more detailed requests for the data collection [33][34][35][36][37][38]. First of all, in this aspect of data quality, the demand of sensing data in target area is , which means that the application is of high quality if the collected data is not less than .…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%
“…Encounter record maintenance is not scalable, it is vulnerable to injection attacks. Li's developed a mitigating routing scheme [15] in which a node's behavior is always monitored by a contact node. Contact node is responsible for the overall functionality of a network.…”
Section: Related Workmentioning
confidence: 99%
“…In this architecture path N7-N6 is malicious node, i.e., when node 7 transmits the data packets to node 6 the packets are dropped, Unlike our existing approaches [14], [15], [16], the proposed ASF-KF leads to block the further transmission paths in DTN architecture. If a transmission founded to be a leakage, it raises alert to the source and it identifies an alternate path based on adaptive SCM node construction methodology, which is discussed in 3.1 so our proposed ASF-KF can effectively calculate the statistical analysis to each transmission.…”
Section: Asf-kf Against Data Injectionmentioning
confidence: 99%
“…Reddy et al in [8] designed a novel routing protocol to solve the survivability protection problem against multi-path failures within a minimum packet redundancy restriction. References [9][10][11][12][13] focus on fault-tolerant issues while considering node placement, topology control, and the routing algorithm. Regarding the design of survivability mechanisms in wireless multi-hop networks, researchers have conducted exploratory work with various optimization objectives during the past few years.…”
Section: Related Workmentioning
confidence: 99%