Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 3 publications
0
11
0
Order By: Relevance
“…The article by Rose et al [24] introduces a technique for WSN with clustering-based topologies. They propose the use of timestamps to detect the presence of malicious nodes, which generate a jamming attack.…”
Section: Related Workmentioning
confidence: 99%
“…Osanaiye, O. et al [ 20 ] have used an exponentially weighted moving average method to detect jamming using the packet inter-arrival time of the packets received from the sensor nodes. The authors in study [ 27 ] propose a technique based on clustering approach and timestamp which made a contribution to the grouping of sensor nodes and the timestamp calculated from one node to another node. A PDR and RSSI metrics are used by Vijayakumar, K. et al [ 28 ] to detect jamming with two methods: fuzzy inference system (FIS) and adaptive neuro-fuzzy inference system (ANFIS).…”
Section: Related Workmentioning
confidence: 99%
“…At this point, every node updates its local clock time by using pairwise or weighted averaging strategies until converging to the average of the initial clock among all nodes. The generic mathematical model of clock update rule for CTS can be written as [19]: where C i (k) is the local time at node i during each iteration 'k' and 'ε' is the constant step size for each iteration. N i is the set of neighboring nodes that can communicate reliably with node i.…”
Section: Consensus Time Synchronization Modelmentioning
confidence: 99%
“…These schemes are often based on login credentials with stored authentication values or private/public key schemes. Attacks can originate from traditionally expected adversaries located inside or outside the network or from previously trusted nodes acting maliciously [21], [22], [23]. Recent advancements in wearable wireless sensors with quality requirements namely, energy, memory, and computational efficiency further incorporate ZKP to provide lightweight authentication with appropriate commitment schemes [24], [25].…”
Section: Related Workmentioning
confidence: 99%
“…Likewise, Casado-Vara et al [20] exhibits an architecture that combines WSN and the blockchain mechanism, presenting the functionality regarding the decentralization of the system, as well as the operation of collection data, but leaving aside characteristics such as integrity, reliability, and security in data transmission and the use of encryption tools. Rose et al [21] clusters the sensor nodes and calculates the timestamp from one node to another. In this methodology, the network nodes are considered infected if the measured transmission time exceeds some threshold.…”
Section: Introductionmentioning
confidence: 99%