2011
DOI: 10.3390/s110707004
|View full text |Cite
|
Sign up to set email alerts
|

Energy Efficient In-network RFID Data Filtering Scheme in Wireless Sensor Networks

Abstract: RFID (Radio frequency identification) and wireless sensor networks are backbone technologies for pervasive environments. In integration of RFID and WSN, RFID data uses WSN protocols for multi-hop communications. Energy is a critical issue in WSNs; however, RFID data contains a lot of duplication. These duplications can be eliminated at the base station, but unnecessary transmissions of duplicate data within the network still occurs, which consumes nodes’ energy and affects network lifetime. In this paper, we p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
36
0
1

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 47 publications
(38 citation statements)
references
References 16 publications
0
36
0
1
Order By: Relevance
“…Research from the current situation, filtering scheme based on the symmetric key is considered most suitable for WSN [11][12][13][14][15][16][17][18][19], and table 1 is more visually after comparing the pros and cons of common false data filtering scheme.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Research from the current situation, filtering scheme based on the symmetric key is considered most suitable for WSN [11][12][13][14][15][16][17][18][19], and table 1 is more visually after comparing the pros and cons of common false data filtering scheme.…”
Section: Discussionmentioning
confidence: 99%
“…Although some scholars have been properly optimized, the cost is still too large, Therefore,These schemes need further research and optimization. Based on public key technology, it is the classic filtering schemes, location-based key [8][9], elliptic curve key [10] and LEDs mechanism [11], and so on. Because they can prevent collusion attacks, security better.…”
Section: B False Data Filtering Methodsmentioning
confidence: 99%
“…Problems include that computation cost is high, duplicate transmission cost is high, and inducing large delays when the total number of tags increase. EIFS [26] is claimed to have better performance than INPFM and CLIF regarding computational and communication cost; however, it can just eliminate about 80% of all redundancy, which may still be a problem for upper layer applications. Another issue for EIFS is that it just simulated a small number of tags (max 500 tags).…”
Section: Related Researchmentioning
confidence: 99%
“…INPFM filters duplicated data at hop distance. As pointed out in [26], several problems still exist by applying INPFM or CLIF. Problems include that computation cost is high, duplicate transmission cost is high, and inducing large delays when the total number of tags increase.…”
Section: Related Researchmentioning
confidence: 99%
See 1 more Smart Citation