Research Article
Rank-Based Report Filtering Scheme (RRFS) for Verifying Phoney Reports in Wireless Sensor Networks
Table 4
Comparison of various schemes.
| S. no. of schemes | Attacks | Node compromise attack | False data injection attack | Report disruption attack | Selective forwarding attack |
| SEF | Prone | Not completely secure | Prone | Prone | IHA | Prone | Secure | Prone | Prone | STEF | Prone | Prone | Prone | Not completely secure | BECAN | Prone | Secure | Prone | Secure | CCEF | Prone | Not completely secure | Prone | Prone | PDF | Secure | Secure | Prone | Prone | ERF | Prone | Not completely secure | Prone | Prone | MIHA | Secure | Secure | Secure | Prone | DEF | Prone | Prone | Secure | Secure | LEDS | Prone | Secure | Secure | Secure | GRSEF | Prone | Not completely secure | Prone | Prone | AEF | Prone | Not completely secure | Not completely secure | Prone | NFFS | Secure | Secure | Prone | Prone | PCREF | Secure | Not completely secure | Prone | Prone | RRFS | Secure | Secure | Secure | Secure |
|
|