Figures & data
Figure 3. Pollution threats. In Figure , once P is adversary, the bogus message must be generated, and Q or I will receive message
. After that, Q or I will make a combination with
and their own message
or
to generate transmission data
(or
). As the data is polluted, J(or K) can not harvest the source data.
![Figure 3. Pollution threats. In Figure 3, once P is adversary, the bogus message eP′ must be generated, and Q or I will receive message eP′. After that, Q or I will make a combination with eP′ and their own message eQ or eI to generate transmission data c1eP′+c2eQ(or c3eP′+c4eI). As the data is polluted, J(or K) can not harvest the source data.](/cms/asset/92050227-a513-400c-bd58-656d6ec53acb/ccos_a_1841109_f0003_oc.jpg)
Table 1. Notations.
Figure 4. With no key or illegal key attacks. Suppose M is an adversary, so when bogus data is injected to the network, R immediately advocates that the data from the node M is polluted after verifying the MACs of M.
![Figure 4. With no key or illegal key attacks. Suppose M is an adversary, so when bogus data is injected to the network, R immediately advocates that the data from the node M is polluted after verifying the MACs of M.](/cms/asset/6be43904-c5c8-45f6-8085-8e3d6a07ab37/ccos_a_1841109_f0004_oc.jpg)
Figure 5. With legal key attacks. Under this situation, there may exist defamation. For example, when P intends to disparage R, it send alerts to SCS and report R as an adversary. In this situation, SCS can quickly make correct judgement by verifying the transmission messages from the node R.
![Figure 5. With legal key attacks. Under this situation, there may exist defamation. For example, when P intends to disparage R, it send alerts to SCS and report R as an adversary. In this situation, SCS can quickly make correct judgement by verifying the transmission messages from the node R.](/cms/asset/494b91b6-34bc-4258-8ad6-eba0e89e0e90/ccos_a_1841109_f0005_oc.jpg)
Table 2. Comparison.