Please use this identifier to cite or link to this item: https://idr.l3.nitk.ac.in/jspui/handle/123456789/11504
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKumar, A.
dc.contributor.authorPais, A.R.
dc.date.accessioned2020-03-31T08:31:34Z-
dc.date.available2020-03-31T08:31:34Z-
dc.date.issued2017
dc.identifier.citationWireless Personal Communications, 2017, Vol.96, 1, pp.697-739en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/11504-
dc.description.abstractMajority of wireless sensor networks (WSNs) are deployed in unattended environments and thus sensor nodes can be compromised easily. A compromised sensor node can be used to send fake sensing reports to the sink. If undetected these reports can raise false alarms. To deal with the problem of fake report generation, a number of en-route filtering schemes have been proposed. Each of these schemes uses different cryptographic methods to check the authenticity of reports while they are being forwarded hop by hop toward base station. However, majority of these techniques can handle only limited compromised nodes or they either need node localization or statically configured routes for sending reports. Furthermore, majority of en-route filtering techniques are vulnerable to various denial of service attacks. Our main aims in this survey are: (a) to describe the major en-route filtering techniques, (b) to analyze these techniques on various parameters including security and (c) to outline main unresolved research challenges in en-route filtering in WSNs. 2017, Springer Science+Business Media New York.en_US
dc.titleEn-Route Filtering Techniques in Wireless Sensor Networks: A Surveyen_US
dc.typeArticleen_US
Appears in Collections:1. Journal Articles

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.