Please use this identifier to cite or link to this item:
https://idr.l1.nitk.ac.in/jspui/handle/123456789/11504
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kumar, A. | |
dc.contributor.author | Pais, A.R. | |
dc.date.accessioned | 2020-03-31T08:31:34Z | - |
dc.date.available | 2020-03-31T08:31:34Z | - |
dc.date.issued | 2017 | |
dc.identifier.citation | Wireless Personal Communications, 2017, Vol.96, 1, pp.697-739 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/11504 | - |
dc.description.abstract | Majority of wireless sensor networks (WSNs) are deployed in unattended environments and thus sensor nodes can be compromised easily. A compromised sensor node can be used to send fake sensing reports to the sink. If undetected these reports can raise false alarms. To deal with the problem of fake report generation, a number of en-route filtering schemes have been proposed. Each of these schemes uses different cryptographic methods to check the authenticity of reports while they are being forwarded hop by hop toward base station. However, majority of these techniques can handle only limited compromised nodes or they either need node localization or statically configured routes for sending reports. Furthermore, majority of en-route filtering techniques are vulnerable to various denial of service attacks. Our main aims in this survey are: (a) to describe the major en-route filtering techniques, (b) to analyze these techniques on various parameters including security and (c) to outline main unresolved research challenges in en-route filtering in WSNs. 2017, Springer Science+Business Media New York. | en_US |
dc.title | En-Route Filtering Techniques in Wireless Sensor Networks: A Survey | en_US |
dc.type | Article | en_US |
Appears in Collections: | 1. Journal Articles |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.