Ieee Infocom 2009 2009
DOI: 10.1109/infcom.2009.5062098
|View full text |Cite
|
Sign up to set email alerts
|

Grouping-Based Resilient Statistical En-Route Filtering for Sensor Networks

Abstract: In sensor networks, the adversaries can inject false data reports from compromising nodes. Previous approaches for filtering false reports, notably statistical en-route filtering, adopt a simple strategy for grouping sensor nodes that requires redundant groups and thus decrease the filtering effectiveness. Worse still, they either suffer a threshold problem, which may lead to complete breakdown of the security protection when the threshold is exceeded, or are dependent on sink stationarity and specific routing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
40
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 37 publications
(40 citation statements)
references
References 12 publications
0
40
0
Order By: Relevance
“…Therefore network security is good location of the key technology [9], elliptic curve key technology [10], DRA mechanism [13] interference polynomial technology [16] and network authentication node assignment strategy [20]; high adaptability is DSF mechanism [18] and network authentication node assignment strategy [20]; large overhead is MAC authentication mechanism [1], one-way hash chain technology [5] (storage overhead is too large), PVFS mechanism [6], location of the key technology [9], elliptic curve key technology [10] and multi path routing filtering mechanism, especially elliptic curve key technology of network for large low density and mobility [10]; assumptions it is the location of the key technology of [9], time synchronization technology [17] proposed technology.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Therefore network security is good location of the key technology [9], elliptic curve key technology [10], DRA mechanism [13] interference polynomial technology [16] and network authentication node assignment strategy [20]; high adaptability is DSF mechanism [18] and network authentication node assignment strategy [20]; large overhead is MAC authentication mechanism [1], one-way hash chain technology [5] (storage overhead is too large), PVFS mechanism [6], location of the key technology [9], elliptic curve key technology [10] and multi path routing filtering mechanism, especially elliptic curve key technology of network for large low density and mobility [10]; assumptions it is the location of the key technology of [9], time synchronization technology [17] proposed technology.…”
Section: Discussionmentioning
confidence: 99%
“…It is the classic filtering schemes, MAC authentication [4], PVFS mechanism [5][6], SIEF mechanism [7] and so on, because their resistance to false data ability strong.…”
Section: B False Data Filtering Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…With the sophisticated use of one-way hash chains in clustered sensor networks, DEF [43] has improved filtering power over SEF [49]. Using the proposed multiple-axis technique, GREF [45] is designed to support en-route filtering in the networks with multiple data sinks. LBRS [50], LTE [52], and LEDS [35] take advantage of location information to enhance the resilience to node compromises.…”
mentioning
confidence: 99%