2017
DOI: 10.3390/sym9110269
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Abstract:Transferring emergent target tracking data to sinks is a major challenge in the Industrial Internet of Things (IIoT), because inefficient data transmission can cause significant personnel and property loss. For tracking a constantly moving mobile target, sensing data should be delivered to sinks continuously and quickly. Although there is some related research, the end to end tracking delay is still unsatisfying. In this paper, we propose a Fast and Efficient Data Forwarding (FEDF) scheme for tracking… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
17
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(17 citation statements)
references
References 46 publications
0
17
0
Order By: Relevance
“…However, preservation of information and sensitive data is one of the biggest challenges in sensor networks [17][18][19]. Due to the high costs, the hardware of sensor nodes is relatively simple and is often unattended in hostile environment, hence prone to different kinds of attacks [20][21][22]. According to the statistics, there are over 30 kinds of attacks against the sensor network [21,23], including black attack, clone attack, selective forwarding attack, and false data injection attack [20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…However, preservation of information and sensitive data is one of the biggest challenges in sensor networks [17][18][19]. Due to the high costs, the hardware of sensor nodes is relatively simple and is often unattended in hostile environment, hence prone to different kinds of attacks [20][21][22]. According to the statistics, there are over 30 kinds of attacks against the sensor network [21,23], including black attack, clone attack, selective forwarding attack, and false data injection attack [20][21][22][23].…”
Section: Introductionmentioning
confidence: 99%
“…Among them, some were conducted against a single type of attack behavior; for example, the literature [23] proposed the multibranch routing scheme for defense against selective forwarding attack. Some other researches were not conducted on the safety security strategy against a certain attack; for example, the traceback strategy proposed in literature [22] belongs to the defense attack strategies. In traceback strategy, the IDs of pass-through routing nodes are added to the data packet, so when an attack occurs, the attack path will be reconstructed, which helps the system obtain the location of attack source and take measures to clear the malicious node.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Internet of Things (IoT) [1][2][3][4][5] and cloud computing [6][7][8][9][10][11][12][13] take advantage of the ubiquity of smart sensor-equipped devices such as smartphones, iPad, and vehicle sensor devices All of these are to collect information with low cost and provide a new paradigm for solving the complex data sensing based applications from the significant demands of critical infrastructure such as surveillance systems [14][15][16], remote patient care systems in healthcare, intelligent traffic management, and automated vehicles in transportation environmental [17][18][19] and weather monitoring systems. In such applications, due to the need to collect a wide range and large amount of data even in a long-term continuous period, the cost of traditional method deploying sensing devices or specialized employee to collect the data is so high limiting the development of applications [20,21].…”
Section: Introductionmentioning
confidence: 99%