2018
DOI: 10.1007/s11227-018-2346-1
|View full text |Cite
|
Sign up to set email alerts
|

SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…A sink privacy preservation scheme presented by ref. [32] in which authors created a camouflage of cooperating nodes around the sink to prevent the location of the sink from being revealed. In ref.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A sink privacy preservation scheme presented by ref. [32] in which authors created a camouflage of cooperating nodes around the sink to prevent the location of the sink from being revealed. In ref.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Data packets are forwarded first to the dummy BS that reroutes them to the real BS. In [37]some of the 1-hop neighbors of the BS are designated as dummy base stations that store data collected from sensor nodes on behalf of the real BS. The stored data is then delivered to the BS when it switches to active time mode.…”
Section: Related Workmentioning
confidence: 99%
“…(3) Verification mechanism Each node will verify the validity of the received data block, valid data will be broadcast, otherwise it will be discarded [20]. Only when all nodes are artificially valid data block can the data block be valid.…”
Section: Sha256(parent Block Hash +Hash+ Merkle Root +Nonce+…)≤tmentioning
confidence: 99%