2016
DOI: 10.1016/j.adhoc.2016.04.010
|View full text |Cite
|
Sign up to set email alerts
|

Energy efficient fuzzy adaptive selection of verification nodes in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
44
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(44 citation statements)
references
References 23 publications
0
44
0
Order By: Relevance
“…Therefore, the node is easily exposed to various attacks, such as environmental damage, as well as physical capture or false report injection attacks and selective forwarding attacks from malicious attackers. Hence, security research that considers the limited resources of these nodes is needed and has been investigated recently [6][7][8].…”
Section: …………………………………………………………………………………………………… Introduction:-mentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, the node is easily exposed to various attacks, such as environmental damage, as well as physical capture or false report injection attacks and selective forwarding attacks from malicious attackers. Hence, security research that considers the limited resources of these nodes is needed and has been investigated recently [6][7][8].…”
Section: …………………………………………………………………………………………………… Introduction:-mentioning
confidence: 99%
“…Therefore, the node is easily exposed to various attacks, such as environmental damage, as well as physical capture or false report injection attacks and selective forwarding attacks from malicious attackers. Hence, security research that considers the limited resources of these nodes is needed and has been investigated recently [6][7][8].In a WSN, an attacker can attempt to cause false alarms at the BS by injecting false event data and depleting the limited energy resources of the nodes by forcing them to forward false reports. Therefore, it is very important to detect a false report injection attack as early as possible.…”
mentioning
confidence: 99%
“…However, FASIN fundamentally differs from PVFS in the selection of intermediate verification nodes. Initially, in the path discovery process, each cluster head acquires the IDs of the upstream CHs, their distances to the e-CH and its own distance to the BS, as well as information about the energy status of the CHs [7,11,29]. Initially the e-CH randomly chooses intermediate verification CHs on all c different routing paths available to the e-CH.…”
Section: Fasinmentioning
confidence: 99%
“…A simple cluster formation scheme is assumed; that is all nodes within one hop distance join to form a cluster, and the nodes that have the smallest IDs in the clusters are elected to be CHs [7]. For the sack of simplicity, it is assumed that sensor nodes cannot be compromised for a very small interval of time during which the formation of clusters, key distribution, and discovery of paths are performed [7,11]. We further assume that the network is exposed to only Symmetry 2017, 9, 220 7 of 25 FRIA and FVIA [7,11].…”
Section: System Model and Assumptionsmentioning
confidence: 99%
“…In a PVFS [4,6,7], a cluster consists of a cluster head (CH) and multiple member sensor nodes (SNs) within a hop using a cluster-based model. The BS produces a global key pool (n partitions × m keys) and assigns the keys of a partition to each cluster.…”
Section: Pvfsmentioning
confidence: 99%