Research Article
Rank-Based Report Filtering Scheme (RRFS) for Verifying Phoney Reports in Wireless Sensor Networks
Table 2
Terms, abbreviations, and symbols.
| Terminology | Description |
| RRFS | Rank-based Report Filtering Scheme | | Guest key | CH | Cluster head | | Selfish key | CS | Cluster Score | ECDH | Elliptical curve Diffie-Hellmen | ECDLP | Elliptic curve discrete logarithm problem | | Private key | | Public key | | Score | ECC | Elliptical Curve Cryptography | DN | Downstream node | UN | Upstream node | MAC | Message Authentication Code | IR | Intracluster Report | ICR | Intercluster Report | RI | Reliability Index | ECH | En-routing cluster head | | Honesty | | Kindness | | Strength | PR | Private Report | ECM | En-routing cluster member | CM | Cluster member | DHE | Diffie-Hellmen | | Timestamp | | Threshold energy | | Event area | | Total number of nodes | | Number of nodes in cluster | | Number of compromised nodes in a cluster | | Number of compromised nodes in forwarding area | | Number of CHs in forwarding area | | Number of compromised CHs in forwarding area | | Total number of nodes in “” | | Number of CHs in “” | | Number of compromised nodes in “” | | Number of compromised CHs in “” |
|
|