Research Article

Rank-Based Report Filtering Scheme (RRFS) for Verifying Phoney Reports in Wireless Sensor Networks

Table 4

Comparison of various schemes.

S. no. of schemesAttacks
Node compromise attackFalse data injection attackReport disruption attackSelective forwarding attack

SEFProneNot completely secureProneProne
IHAProneSecureProneProne
STEFProneProneProneNot completely secure
BECANProneSecureProneSecure
CCEFProneNot completely secureProneProne
PDFSecureSecureProneProne
ERFProneNot completely secureProneProne
MIHASecureSecureSecureProne
DEFProneProneSecureSecure
LEDSProneSecureSecureSecure
GRSEFProneNot completely secureProneProne
AEFProneNot completely secureNot completely secureProne
NFFSSecureSecureProneProne
PCREFSecureNot completely secureProneProne
RRFSSecureSecureSecureSecure