Research Article

Rank-Based Report Filtering Scheme (RRFS) for Verifying Phoney Reports in Wireless Sensor Networks

Table 1

Pros and cons of various filtering schemes.

S. no.SchemesSignificanceProsCons

1SEF(i) Nonoverlapping key partition
(ii) Bloom filter for reducing overhead
(i) Supports dynamic topology
(ii) Easy to apply
(i) threshold limitation
(ii) Does not work with the compromised partition

2IHA(i) Hop-by-hop authentication
(ii) Pairwise key establishment
(i) Works on node failure
(ii) Path-based filtering
(i) Maintenance cost is high
(ii) Path dependency

3STEF(i) Query-based approach
(ii) Verification based on tickets
(i) Verify the report validity
(ii) Only ticket holders forward the report
(i) The unnecessary dropping of reports due to route failure

4BECAN(i) CNR-based authentication
(ii) Bit-compressed scheme
(i) Key independency
(ii) Ensures reliability
(i) Need prior knowledge about nodes in the path
(ii) Communication overhead

5CCEF(i) Cipher-based authentication
(ii) Secure query/response session
(i) Works for dynamic networks
(ii) No threshold limitation
(i) Poor filtering
(ii) Need extra care for report dissemination

6CAEFS(i) Integrated with all the other schemes to provide security
(ii) Context-aware approach
(i) Compromised node isolation
(ii) Resiliency
(i) Energy consumption is high

7ERF(i) Extension for CCEF
(ii) Path creation based on distance
(i) Key dissemination only to an intermediate node
(ii) Extends the lifetime of the nodes
(i) Need extra care for report dissemination
(ii) CH requires prior knowledge of path and keys

8MIHA(i) Multipath authentication
(ii) Keys are derived using a hash function
(i) Works for disjoint/braided path
(ii) Route switching by the sink
(i) Node exploitation due to multiple paths
(ii) Consumes more energy

9DEF(i) Uses hill climbing approach for key distribution
(ii) Cluster-based approach
(i) Works independently on dissemination
(ii) Suitable for dynamic topology
(i) Utilize more energy
(ii) Report delays

10LEDS(i) Location-based filtering scheme
(ii) A symmetric key approach for filtering
(i) No threshold limitation
(ii) Provides E2E security
(i) Need location-aware key
(ii) Relies on a path for report forwarding

11GRPEF(i) Location-based filtering scheme
(ii) Key derivation using a multiaxis approach
(i) Supports sink mobility
(ii) No threshold limitation
(i) Localization is complex
(ii) Utilize more energy

12AEF(i) Based on a fitness function
(ii) Provides security with a minimal number of nodes
(i) Energy-aware scheme
(ii) Address dynamic query
(i) No key independency

13NFFS(i) Position-based filtering scheme
(ii) Decides whether the report generating nodes are logical
(i) No threshold limitation
(ii) Provides energy efficiency
(i) Not for dynamic networks

14PCREF(i) Uses MAP
(ii) Cluster-based approach
(i) Does not have a fixed path
(ii) Cluster-based approach
(i) threshold limitation
(ii) Storage overhead

15KAEF(i) One-way authentication
(ii) Verification based on stored information
(i) New keys for every session
(ii) The hash function for chain maintenance
(i) Need for key reinitiation

16TICK(i) Time-based filtering scheme
(ii) Key generation based on clock function
(i) No need for a key exchange(i) Not for an uncontrolled environment