2018
DOI: 10.1007/s11761-018-0241-5
|View full text |Cite
|
Sign up to set email alerts
|

Efficient privacy-preserving fault tolerance aggregation for people-centric sensing system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Moreover, the results are evaluated based on secure communications, transmission delay and communication overhead. The obtained results are compared with the existing models such as Anonysense [5] and EPPFTA [15]. Further, the model is evaluated using the Network Simulation Tool called NS-2, with the initial simulation settings, mentioned in Table III, since, the real-time evaluations are complicated to process.…”
Section: Experiments and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Moreover, the results are evaluated based on secure communications, transmission delay and communication overhead. The obtained results are compared with the existing models such as Anonysense [5] and EPPFTA [15]. Further, the model is evaluated using the Network Simulation Tool called NS-2, with the initial simulation settings, mentioned in Table III, since, the real-time evaluations are complicated to process.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…The model designed in terms of false data an injection attack that also supports data integrity. Fault tolerance based aggregation with the security enforcement has been done by the authors of [15]. And, the model has been named as Efficient Privacy Preserving Fault Tolerance Aggregation (EPPFTA) and the results are evaluated based on the performance factors such as packet delivery rate and transmission delay.…”
Section: Related Workmentioning
confidence: 99%
“…Further, the model was not attacks resistive. The survey work presented in [7], [8] and [9] discussed about the adversaries and countermeasures for various attacks on urban sensing network. The attack models and mitigation techniques were discussed with effective data distribution strategies [11].…”
Section: Related Workmentioning
confidence: 99%