메뉴 건너뛰기




Volumn 31, Issue 17, 2008, Pages 3941-3953

Functional reputation based reliable data aggregation and transmission for wireless sensor networks

Author keywords

Reliable data aggregation; Reputation; Trust; Wireless sensor networks

Indexed keywords

AGGLOMERATION; COMPUTER NETWORKS; DATA FUSION; HYBRID SENSORS; NETWORK PROTOCOLS; PROGRAMMING THEORY; RELIABILITY; SENSOR DATA FUSION; SENSOR NETWORKS; SENSORS; TELECOMMUNICATION EQUIPMENT;

EID: 54949103489     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2008.07.017     Document Type: Article
Times cited : (86)

References (47)
  • 3
    • 0036375244 scopus 로고    scopus 로고
    • C. Intanagonwiwat, D. Estrin, R. Govindan, J. Heidemann, Impact of network density on data aggregation in wireless sensor networks, in: Proc. of the 22nd International Conference on Distributed Computing Systems, 2002, pp. 575-578.
    • C. Intanagonwiwat, D. Estrin, R. Govindan, J. Heidemann, Impact of network density on data aggregation in wireless sensor networks, in: Proc. of the 22nd International Conference on Distributed Computing Systems, 2002, pp. 575-578.
  • 4
    • 54949146535 scopus 로고    scopus 로고
    • D. Estrin, R. Govindan, J. Heidemann, S. Kumar, Scalable coordination in sensor networks, in: Proc. of the ACM/IEEE International Conference on Mobile Computing and Networking, 1999, pp. 263-270.
    • D. Estrin, R. Govindan, J. Heidemann, S. Kumar, Scalable coordination in sensor networks, in: Proc. of the ACM/IEEE International Conference on Mobile Computing and Networking, 1999, pp. 263-270.
  • 5
    • 84978428047 scopus 로고    scopus 로고
    • S. R. Madden, M. J. Franklin, J. M. Hellerstein, W. Hong, TAG: a Tiny AGgregation service for ad-hoc sensor networks, in: Proc. of the 5th Annual Symposium on Operating Systems Design and Implementation (OSDI), 2002, pp. 131-146.
    • S. R. Madden, M. J. Franklin, J. M. Hellerstein, W. Hong, TAG: a Tiny AGgregation service for ad-hoc sensor networks, in: Proc. of the 5th Annual Symposium on Operating Systems Design and Implementation (OSDI), 2002, pp. 131-146.
  • 6
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • Chan H., and Perrig A. Security and privacy in sensor networks. IEEE Computer Magazine (2003) 103-105
    • (2003) IEEE Computer Magazine , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 9
    • 26444574670 scopus 로고    scopus 로고
    • C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: Proc. of the Second ACM Conference on Embedded Networked Sensor Systems, 2004, pp. 162-175.
    • C. Karlof, N. Sastry, D. Wagner, TinySec: a link layer security architecture for wireless sensor networks, in: Proc. of the Second ACM Conference on Embedded Networked Sensor Systems, 2004, pp. 162-175.
  • 10
    • 84943753034 scopus 로고    scopus 로고
    • L. Hu, D. Evans, Secure aggregation for wireless networks, in: Proc. of Workshop on Security and Assurance in Ad hoc Networks, 2003, pp. 384-391.
    • L. Hu, D. Evans, Secure aggregation for wireless networks, in: Proc. of Workshop on Security and Assurance in Ad hoc Networks, 2003, pp. 384-391.
  • 12
    • 32644435647 scopus 로고    scopus 로고
    • H. Çam, S. Ozdemir, P. Nair, D. Muthuavinashiappan, H.O. Sanli, Energy-efficient and secure pattern based data aggregation for wireless sensor networks, Special Issue of Computer Communications on Sensor Networks, 2006, pp. 446-455.
    • H. Çam, S. Ozdemir, P. Nair, D. Muthuavinashiappan, H.O. Sanli, Energy-efficient and secure pattern based data aggregation for wireless sensor networks, Special Issue of Computer Communications on Sensor Networks, 2006, pp. 446-455.
  • 13
    • 85163689857 scopus 로고    scopus 로고
    • W. Du, J. Deng, Y.S. Han, P.K. Varshney, A witness-based approach for data fusion assurance in wireless sensor networks, in: Proc. of IEEE Global Telecommunications Conference, 2003, pp. 1435-1439.
    • W. Du, J. Deng, Y.S. Han, P.K. Varshney, A witness-based approach for data fusion assurance in wireless sensor networks, in: Proc. of IEEE Global Telecommunications Conference, 2003, pp. 1435-1439.
  • 14
    • 33749986533 scopus 로고    scopus 로고
    • Secure data aggregation without persistent cryptographic operations in wireless sensor networks
    • Wu K., Dreef D., Sun B., and Xiao Y. Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Ad Hoc Networks 5 1 (2007) 100-111
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 100-111
    • Wu, K.1    Dreef, D.2    Sun, B.3    Xiao, Y.4
  • 15
    • 14844315770 scopus 로고    scopus 로고
    • S. Ganeriwal, M. Srivastava, Reputation based framework for high integrity sensor networks, in: Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004, pp. 66-77.
    • S. Ganeriwal, M. Srivastava, Reputation based framework for high integrity sensor networks, in: Proc. of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004, pp. 66-77.
  • 17
    • 36949013183 scopus 로고    scopus 로고
    • A. Srinivasan, J. Teitelbaum, J. Wu, DRBTS: distributed reputationbased beacon trust system, in: Proc. of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2006, pp. 277-283.
    • A. Srinivasan, J. Teitelbaum, J. Wu, DRBTS: distributed reputationbased beacon trust system, in: Proc. of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2006, pp. 277-283.
  • 19
    • 54949124268 scopus 로고    scopus 로고
    • A. Josang, R. Ismail, The beta reputation system, in: Proc. of the 15th Bled Conf. Electronic Commerce, 2002, p. 41.
    • A. Josang, R. Ismail, The beta reputation system, in: Proc. of the 15th Bled Conf. Electronic Commerce, 2002, p. 41.
  • 21
    • 85176182819 scopus 로고    scopus 로고
    • P. Resnick, R. Zeckhauser, Trust among strangers in Internet transactions: empirical analysis of eBays reputation system, in: M.R. Baye (Ed.), Advances in Applied Microeconomics, vol. 11, Elsevier Science, 2003.
    • P. Resnick, R. Zeckhauser, Trust among strangers in Internet transactions: empirical analysis of eBays reputation system, in: M.R. Baye (Ed.), Advances in Applied Microeconomics, vol. 11, Elsevier Science, 2003.
  • 22
    • 54949153442 scopus 로고    scopus 로고
    • M. Blaze, J. Feigenbaum, J. Ioannidis, A. Keromytis, RFC2704 - The KeyNote Trust Management System, 1999.
    • M. Blaze, J. Feigenbaum, J. Ioannidis, A. Keromytis, RFC2704 - The KeyNote Trust Management System, 1999.
  • 23
    • 54949111380 scopus 로고    scopus 로고
    • S. Buchegger, J.L. Boudec, Performance analysis of the CONFIDANT protocol, in: Proc. of ACM Mobihoc, 2002, pp. 226-236.
    • S. Buchegger, J.L. Boudec, Performance analysis of the CONFIDANT protocol, in: Proc. of ACM Mobihoc, 2002, pp. 226-236.
  • 24
    • 54949096644 scopus 로고    scopus 로고
    • P. Michiardi, R. Molva, CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in: Proc. of Communication and Multimedia Security, 2002, pp. 107-121.
    • P. Michiardi, R. Molva, CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in: Proc. of Communication and Multimedia Security, 2002, pp. 107-121.
  • 25
    • 84944078503 scopus 로고    scopus 로고
    • L. Xiong, L. Liu, A reputation-based trust model for peer-to-peer ecommerce communities, in: Proc. of IEEE Conference on Ecommerce, 2003, p. 275.
    • L. Xiong, L. Liu, A reputation-based trust model for peer-to-peer ecommerce communities, in: Proc. of IEEE Conference on Ecommerce, 2003, p. 275.
  • 27
    • 48049097061 scopus 로고    scopus 로고
    • M.J. Probst, S.K. Kasera, Statistical trust establishment in wireless sensor networks, in: Proc. of 13th Int. Conference on Parallel and Distributed Systems, vol. 1, 2007, pp. 1-8.
    • M.J. Probst, S.K. Kasera, Statistical trust establishment in wireless sensor networks, in: Proc. of 13th Int. Conference on Parallel and Distributed Systems, vol. 1, 2007, pp. 1-8.
  • 28
    • 33144465932 scopus 로고    scopus 로고
    • Information theoretic framework of trust modeling and evaluation for ad hoc networks
    • Sun Y., Yu W., Han Z., and Ray Liu K.J. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24 2 (2006) 305-317
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 305-317
    • Sun, Y.1    Yu, W.2    Han, Z.3    Ray Liu, K.J.4
  • 29
    • 51349155690 scopus 로고    scopus 로고
    • M. Raya, P. Papadimitratos, V.D. Gligor, J.P. Hubaux, On data-centric trust establishment in ephemeral ad hoc networks, in: Proc. of INFOCOM 2008, April 2008.
    • M. Raya, P. Papadimitratos, V.D. Gligor, J.P. Hubaux, On data-centric trust establishment in ephemeral ad hoc networks, in: Proc. of INFOCOM 2008, April 2008.
  • 30
    • 54949128325 scopus 로고    scopus 로고
    • Crossbow Technologies Inc., 2008. Available from: .
    • Crossbow Technologies Inc., 2008. Available from: .
  • 31
    • 85177504856 scopus 로고    scopus 로고
    • S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proc. of the 6th ACM/IEEE International Conference on Mobile Computing and Networking, 2000, pp. 255-265.
    • S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proc. of the 6th ACM/IEEE International Conference on Mobile Computing and Networking, 2000, pp. 255-265.
  • 32
    • 3042822764 scopus 로고    scopus 로고
    • D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: Proc. of the 10th ACM Conference on Computer and Communications Security, 2003, pp. 52-61.
    • D. Liu, P. Ning, Establishing pairwise keys in distributed sensor networks, in: Proc. of the 10th ACM Conference on Computer and Communications Security, 2003, pp. 52-61.
  • 33
    • 3042783638 scopus 로고    scopus 로고
    • W. Du, J. Deng, Y. S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, in: Proc. of the 10th ACM Conference on Computer and Communications Security, 2003, pp. 42-51.
    • W. Du, J. Deng, Y. S. Han, P.K. Varshney, A pairwise key pre-distribution scheme for wireless sensor networks, in: Proc. of the 10th ACM Conference on Computer and Communications Security, 2003, pp. 42-51.
  • 35
    • 3042785862 scopus 로고    scopus 로고
    • J. Newsome, E. Shi, D. Song, A. Perrig, The Sybil attack in sensor networks: analysis and defenses, in: Proc. of 3rd IEEE/ACM Information Processing in Sensor Networks, 2004, pp. 259-268.
    • J. Newsome, E. Shi, D. Song, A. Perrig, The Sybil attack in sensor networks: analysis and defenses, in: Proc. of 3rd IEEE/ACM Information Processing in Sensor Networks, 2004, pp. 259-268.
  • 36
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: attacks and countermeasures
    • Karlof C., and Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1 2-3 (2003) 293-315
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 38
    • 33749041485 scopus 로고    scopus 로고
    • R. Roman, J. Zhou, J. Lopez, Applying intrusion detection systems to wireless sensor networks, in: Proc. of Consumer Communications and Networking Conference, 2006, pp. 640-644.
    • R. Roman, J. Zhou, J. Lopez, Applying intrusion detection systems to wireless sensor networks, in: Proc. of Consumer Communications and Networking Conference, 2006, pp. 640-644.
  • 39
    • 54949101209 scopus 로고    scopus 로고
    • H. Cam, S. Ozdemir, in: Yang Xiao (Ed.), False Data Detection and Secure Data Aggregation in Wireless Sensor Networks, Security in Distributed, Grid, Mobile and Pervasive Computing, Auerbach Publications, 2007.
    • H. Cam, S. Ozdemir, in: Yang Xiao (Ed.), False Data Detection and Secure Data Aggregation in Wireless Sensor Networks, Security in Distributed, Grid, Mobile and Pervasive Computing, Auerbach Publications, 2007.
  • 40
    • 33751067753 scopus 로고    scopus 로고
    • S. Ozdemir, H. Cam, Key establishment with source coding and reconciliation for wireless sensor networks, in: Proc. of IEEE IPCCC, 2006, pp. 55-63.
    • S. Ozdemir, H. Cam, Key establishment with source coding and reconciliation for wireless sensor networks, in: Proc. of IEEE IPCCC, 2006, pp. 55-63.
  • 41
    • 54949151552 scopus 로고    scopus 로고
    • J. Han, M. Kamber, Data Mining: Concepts and Techniques, second ed., The Morgan Kaufmann Series in Data Management Systems, 2007, pp. 455-456.
    • J. Han, M. Kamber, Data Mining: Concepts and Techniques, second ed., The Morgan Kaufmann Series in Data Management Systems, 2007, pp. 455-456.
  • 42
    • 54949102446 scopus 로고    scopus 로고
    • S. Buchegger, J.Y.L. Boudec, The effect of rumor spreading in reputation systems for mobile ad-hoc networks, in: Proc. of WiOpt Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2003.
    • S. Buchegger, J.Y.L. Boudec, The effect of rumor spreading in reputation systems for mobile ad-hoc networks, in: Proc. of WiOpt Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, 2003.
  • 43
    • 54949125392 scopus 로고    scopus 로고
    • C. Dellarocas, Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior, in: Proc. of the second ACM Conference on Electronic Commerce, 2000, pp. 150-157.
    • C. Dellarocas, Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior, in: Proc. of the second ACM Conference on Electronic Commerce, 2000, pp. 150-157.
  • 44
    • 50249148413 scopus 로고    scopus 로고
    • O. Garcia, H. Baldus, Distributed node revocation based on cooperative security, in: Proc. of IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, 2007, pp.1-7.
    • O. Garcia, H. Baldus, Distributed node revocation based on cooperative security, in: Proc. of IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems, 2007, pp.1-7.
  • 45
    • 2342588224 scopus 로고    scopus 로고
    • Analysis of multipath routing. Part I: The effect on the packet delivery ratio
    • Tsirigos A., and Haas Z.J. Analysis of multipath routing. Part I: The effect on the packet delivery ratio. IEEE Transactions on Wireless Communications 3 1 (2004) 138-146
    • (2004) IEEE Transactions on Wireless Communications , vol.3 , Issue.1 , pp. 138-146
    • Tsirigos, A.1    Haas, Z.J.2
  • 46
    • 54949134916 scopus 로고    scopus 로고
    • TinyOS Simulator, 2008. Available from: .
    • TinyOS Simulator, 2008. Available from: .
  • 47
    • 26644435250 scopus 로고    scopus 로고
    • V. Shnayder, M. Hempstead, B. Chen, G.W. Allen, M. Welsh, Simulating the power consumption of large-scale sensor network applications, in: Proc. of the 2nd International Conference on Embedded Networked Sensor System, 2004, pp. 188-200.
    • V. Shnayder, M. Hempstead, B. Chen, G.W. Allen, M. Welsh, Simulating the power consumption of large-scale sensor network applications, in: Proc. of the 2nd International Conference on Embedded Networked Sensor System, 2004, pp. 188-200.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.