메뉴 건너뛰기




Volumn , Issue , 2006, Pages 71-82

Attack-resilient hierarchical data aggregation in sensor networks

Author keywords

Attack resilient; Data aggregation; Hierarchical aggregation; Sensor network security; Synopsis diffusion

Indexed keywords

ATTACK-RESILIENT; DATA AGGREGATION; HIERARCHICAL AGGREGATION; SENSOR NETWORK SECURITY; SYNOPSIS DIFFUSION;

EID: 34547406263     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180345.1180355     Document Type: Conference Paper
Times cited : (47)

References (25)
  • 1
    • 84954417747 scopus 로고    scopus 로고
    • M. Bellare, R. Guerin, and P. Rogaway. XOR MACs: New methods for message authentication using finite pseudorandom functions. In Proc. of the 15th Annual International Cryptology Conference on Advances in Cryptology - CRYPTO'95, pages 15-28, 1995.
    • M. Bellare, R. Guerin, and P. Rogaway. XOR MACs: New methods for message authentication using finite pseudorandom functions. In Proc. of the 15th Annual International Cryptology Conference on Advances in Cryptology - CRYPTO'95, pages 15-28, 1995.
  • 5
    • 0020828424 scopus 로고
    • Probabilistic counting algorithms for data base applications
    • P. Flajolet and G. N. Martin. Probabilistic counting algorithms for data base applications. Journal of Computer and System Sciences, 31(2):182-209, 1985.
    • (1985) Journal of Computer and System Sciences , vol.31 , Issue.2 , pp. 182-209
    • Flajolet, P.1    Martin, G.N.2
  • 13
    • 84858091991 scopus 로고    scopus 로고
    • Mica Motes, http://www.xbow.com.
    • Mica Motes
  • 18
    • 33748089962 scopus 로고    scopus 로고
    • SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
    • Y. Yang, X. Wang, S. Zhu, and G. Cao. SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. In Proc. of ACM MOBIHOC, 2006.
    • (2006) Proc. of ACM MOBIHOC
    • Yang, Y.1    Wang, X.2    Zhu, S.3    Cao, G.4
  • 19
    • 1442296009 scopus 로고    scopus 로고
    • The cougar approach, to in-network query processing in sensor networks
    • September
    • Y. Yao and J. E. Gehrke. The cougar approach, to in-network query processing in sensor networks. ACM SIGMOD Record, 31(2):9-18, September 2002.
    • (2002) ACM SIGMOD Record , vol.31 , Issue.2 , pp. 9-18
    • Yao, Y.1    Gehrke, J.E.2
  • 20
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route filtering of injected false data in sensor networks
    • Fan Ye, Haiyun Luo, Songwu Lu, and Lixia Zhang. Statistical en-route filtering of injected false data in sensor networks. In Proc. of IEEE Infocom, 2004.
    • (2004) Proc. of IEEE Infocom
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 21
    • 25844473466 scopus 로고    scopus 로고
    • Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach
    • W Zhang and G. Cao. Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach. Proc. of IEEE Infocom, 2005.
    • (2005) Proc. of IEEE Infocom
    • Zhang, W.1    Cao, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.