2017 International Conference on Communication, Computing and Digital Systems (C-Code) 2017
DOI: 10.1109/c-code.2017.7918893
|View full text |Cite
|
Sign up to set email alerts
|

Secure provenance in Wireless Sensor Networks - a survey of provenance schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…In the rest of this section, we present simulation results to show that allocating variable size Bloom filters is better for the SSMP protocol when the number of neighbours reported by the nodes are different, i.e., γ i = γ j , for some i = j. To present these results, we consider a sparse vehicular network consisting of n = 8 nodes such that the neighbour distribution reported by the nodes is given by Γ = [5,3,4,1,4,2,4]. For this network, first, we fix a value of m sum = 280, and then obtain the FPRs for the case of equal sized Bloom filters, i.e., when m i = 40 for each 1 ≤ i ≤ 7.…”
Section: Simulation Results On Parameter Optimizationmentioning
confidence: 99%
See 3 more Smart Citations
“…In the rest of this section, we present simulation results to show that allocating variable size Bloom filters is better for the SSMP protocol when the number of neighbours reported by the nodes are different, i.e., γ i = γ j , for some i = j. To present these results, we consider a sparse vehicular network consisting of n = 8 nodes such that the neighbour distribution reported by the nodes is given by Γ = [5,3,4,1,4,2,4]. For this network, first, we fix a value of m sum = 280, and then obtain the FPRs for the case of equal sized Bloom filters, i.e., when m i = 40 for each 1 ≤ i ≤ 7.…”
Section: Simulation Results On Parameter Optimizationmentioning
confidence: 99%
“…, k n−1 } are fixed. For each node sx in the sorted list, we pick the last n − γ sx − 2 distinct nodes (excluding node sx) of N sorted , and use the corresponding f f p values when computing the counterparts of node sx in (5). By denoting this set of n − γ sx − 2 nodes by S x , an upper bound on the FPRs can be written as…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“… Interoperability Standards: More work is needed to establish interoperability standards and frameworks that facilitate seamless integration of blockchain-powered healthcare systems with existing infrastructure. Developing common data formats, standard protocols, and governance models can promote interoperability [ 7 ]. Hybrid Deep Learning Models: Future research should explore advanced hybrid deep learning models specifically designed for healthcare data analysis within a blockchain framework.…”
Section: Related Studiesmentioning
confidence: 99%