GLOBECOM 2020 - 2020 IEEE Global Communications Conference 2020
DOI: 10.1109/globecom42002.2020.9322295
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Selective Forwarding using Sentinels in Clustered IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…Recently, researchers have turned to SBS, which provides theoretical foundations for abnormal detection without presuming trust values or depending on training data [17], [21], [22]. However, previous SBS still faces the challenge of requiring massive forwarding observations, leading to expensive costs in low-resource cluster-tree networks [23], [24]. The detection method based on the likelihood ratio test (LRT), which estimates the real abnormal packet loss rate as a default value, was adopted to improve the detection efficiency of SBS [25].…”
Section: A Motivation and Problem Statementmentioning
confidence: 99%
See 3 more Smart Citations
“…Recently, researchers have turned to SBS, which provides theoretical foundations for abnormal detection without presuming trust values or depending on training data [17], [21], [22]. However, previous SBS still faces the challenge of requiring massive forwarding observations, leading to expensive costs in low-resource cluster-tree networks [23], [24]. The detection method based on the likelihood ratio test (LRT), which estimates the real abnormal packet loss rate as a default value, was adopted to improve the detection efficiency of SBS [25].…”
Section: A Motivation and Problem Statementmentioning
confidence: 99%
“…Resolving the adversarial attack problem is essential to improve the performance of abnormal node detection in clustertree networks because the detection data is easily falsified by malicious nodes [14], [20], [23], [24]. Due to the detection data being generated by the child nodes of the node to be checked, the malicious child can falsify the detection information to prevent its abnormal parent from being detected.…”
Section: A Motivation and Problem Statementmentioning
confidence: 99%
See 2 more Smart Citations