메뉴 건너뛰기




Volumn 2, Issue 2, 2009, Pages 181-194

Confidentiality and integrity for data aggregation in WSN using peer monitoring

Author keywords

Bogus data injection attack; Node failure; Peer monitoring; Resilience; Secure data aggregation; Wireless sensor networks

Indexed keywords

NETWORK SECURITY; WIRELESS SENSOR NETWORKS;

EID: 67749118172     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.93     Document Type: Article
Times cited : (43)

References (44)
  • 2
    • 0036375244 scopus 로고    scopus 로고
    • Impact of network density on data aggregation in wireless sensor networks
    • Washington, DC, USA, IEEE Computer Society
    • Intanagonwiwat C, Estrin D, Govindan R, Heidemann J. Impact of network density on data aggregation in wireless sensor networks. In Proceedings of IEEE ICDCS, Washington, DC, USA, 2002; 457. IEEE Computer Society.
    • (2002) Proceedings of IEEE ICDCS , pp. 457
    • Intanagonwiwat, C.1    Estrin, D.2    Govindan, R.3    Heidemann, J.4
  • 3
    • 84994296501 scopus 로고    scopus 로고
    • The impact of data aggregation in wireless sensor networks
    • Washington, DC, USA, IEEE Computer Society
    • Krishnamachari B, Estrin D, Wicker SB. The impact of data aggregation in wireless sensor networks. In Proceedings of IEEE ICDCSW, Washington, DC, USA, 2002; 575-578. IEEE Computer Society.
    • (2002) Proceedings of IEEE ICDCSW , pp. 575-578
    • Krishnamachari, B.1    Estrin, D.2    Wicker, S.B.3
  • 4
    • 84978428047 scopus 로고    scopus 로고
    • Tag: A tiny aggregation service for ad-hoc sensor networks
    • New York, NY, USA, ACM Press
    • Madden S, Frankli MJ, Hellerstein JM, Hong W. Tag: a tiny aggregation service for ad-hoc sensor networks. In Proceedings of ACMOSDI, New York, NY, USA, 2002;131-146. ACM Press.
    • (2002) Proceedings of ACMOSDI , pp. 131-146
    • Madden, S.1    Frankli, M.J.2    Hellerstein, J.M.3    Hong, W.4
  • 5
    • 17744386714 scopus 로고    scopus 로고
    • Key infection: Smart trust for smart dust
    • Washington, DC, USA, IEEE Computer Society
    • Anderson R, Chan H, Perrig A. Key infection: smart trust for smart dust. In Proceedings of IEEE ICNP, Washington, DC, USA, 2004; 206-215. IEEE Computer Society.
    • (2004) Proceedings of IEEE ICNP , pp. 206-215
    • Anderson, R.1    Chan, H.2    Perrig, A.3
  • 7
    • 33749625947 scopus 로고    scopus 로고
    • Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks
    • Di Pietro R, Mancini LV, Mei A. Energy efficient node-to-node authentication and communication confidentiality in wireless sensor networks. Wireless Networks 2006; 12(6): 709-721.
    • (2006) Wireless Networks , vol.12 , Issue.6 , pp. 709-721
    • Di Pietro, R.1    Mancini, L.V.2    Mei, A.3
  • 8
    • 33749525209 scopus 로고    scopus 로고
    • Efficient aggregation of encrypted data in wireless sensor networks
    • San Diego, CA, USA
    • Castelluccia C, Mykletun E, Tsudik G. Efficient aggregation of encrypted data in wireless sensor networks. In Proceedings of ACM/IEEE Mobiquitous, San Diego, CA, USA, 2005; 109-117.
    • (2005) Proceedings of ACM/IEEE Mobiquitous , pp. 109-117
    • Castelluccia, C.1    Mykletun, E.2    Tsudik, G.3
  • 10
    • 0036375244 scopus 로고    scopus 로고
    • Impact of network density on data aggregation in wireless sensor networks
    • Washington, DC, USA, IEEE Computer Society
    • Intanagonwiwat C, Estrin D, Govindan R, Heidemann J. Impact of network density on data aggregation in wireless sensor networks. In Proceedings of IEEE ICDCS, Washington, DC, USA, 2002; 457. IEEE Computer Society.
    • (2002) Proceedings of IEEE ICDCS , pp. 457
    • Intanagonwiwat, C.1    Estrin, D.2    Govindan, R.3    Heidemann, J.4
  • 11
    • 84943753034 scopus 로고    scopus 로고
    • Secure aggregation for wireless networks
    • Washington, DC, USA, IEEE Computer Society
    • Hu L, Evans D. Secure aggregation for wireless networks. In Proceedings of SAINT, Washington, DC, USA, 2003; 384. IEEE Computer Society.
    • (2003) Proceedings of SAINT , pp. 384
    • Hu, L.1    Evans, D.2
  • 12
    • 14844300164 scopus 로고    scopus 로고
    • Resilient aggregation in sensor networks
    • New York, NY, USA, ACM Press
    • Wagner D. Resilient aggregation in sensor networks. In Proceedings of ACM SASN, New York, NY, USA, 2004; 78-87. ACM Press.
    • (2004) Proceedings of ACM SASN , pp. 78-87
    • Wagner, D.1
  • 13
    • 84947614937 scopus 로고    scopus 로고
    • Girao J, Schneider M, Westhoff D. Cda: concealed data aggregation in wireless sensor networks. In Proceedings of ACM WISE, Philadelphia, USA, October 2004. WiSe 2004. Poster presentation.
    • Girao J, Schneider M, Westhoff D. Cda: concealed data aggregation in wireless sensor networks. In Proceedings of ACM WISE, Philadelphia, USA, October 2004. WiSe 2004. Poster presentation.
  • 14
    • 24144459865 scopus 로고    scopus 로고
    • Cda: Concealed data aggregation for reverse multicast traffic in wireless sensor networks
    • Seoul, Korea, May, ICC2005
    • Girao J, Westhoff D, Schneider M. Cda: concealed data aggregation for reverse multicast traffic in wireless sensor networks. In Proceedings of IEEE ICC, Seoul, Korea, May 2005. ICC2005.
    • (2005) Proceedings of IEEE ICC
    • Girao, J.1    Westhoff, D.2    Schneider, M.3
  • 15
    • 33748351402 scopus 로고    scopus 로고
    • Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
    • Westhoff D, Girao J, Acharya M. Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation. IEEE Transactions on Mobile Computing 2006; 5(10): 1417-1431.
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.10 , pp. 1417-1431
    • Westhoff, D.1    Girao, J.2    Acharya, M.3
  • 16
    • 33845747795 scopus 로고    scopus 로고
    • Secure hierarchical in-network aggregation in sensor networks
    • New York, NY, USA, ACM Press
    • Chan H, Perrig A, Song D. Secure hierarchical in-network aggregation in sensor networks. In Proceedings of ACM CCS, New York, NY, USA, 2006; 278-287. ACM Press.
    • (2006) Proceedings of ACM CCS , pp. 278-287
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 17
    • 56749178915 scopus 로고    scopus 로고
    • An efficient integrity-preserving scheme for hierarchical sensor aggregation
    • New York, NY, USA, ACM Press
    • Frikken KB, Dougherty JA, IV. An efficient integrity-preserving scheme for hierarchical sensor aggregation. In Proceedings of ACMWiSec '08, New York, NY, USA, 2008; 68-76. ACM Press.
    • (2008) Proceedings of ACMWiSec '08 , pp. 68-76
    • Frikken, K.B.1    Dougherty, J.I.2
  • 18
    • 34547471023 scopus 로고    scopus 로고
    • Ranbar: Ransac-based resilient aggregation in sensor networks
    • New York, NY, USA, ACM Press
    • Buttyán L, Schaffer P, Vajda I. Ranbar: ransac-based resilient aggregation in sensor networks. In Proceedings of ACM SASN, New York, NY, USA, 2006; 83-90. ACM Press.
    • (2006) Proceedings of ACM SASN , pp. 83-90
    • Buttyán, L.1    Schaffer, P.2    Vajda, I.3
  • 19
    • 70249146943 scopus 로고    scopus 로고
    • Securely computing an approximate median in wireless sensor networks
    • in press
    • Roy S, Conti M, Setia S, Jajodia S. Securely computing an approximate median in wireless sensor networks. In Proceedings of Secure Comm 2008, in press, 2008.
    • (2008) Proceedings of Secure Comm
    • Roy, S.1    Conti, M.2    Setia, S.3    Jajodia, S.4
  • 20
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • ACM Press
    • Eschenauer L, Gligor VD. A key-management scheme for distributed sensor networks. In Proceedings of the ACM CCS, 2002; 41-47. ACM Press.
    • (2002) Proceedings of the ACM CCS , pp. 41-47
    • Eschenauer, L.1    Gligor, V.D.2
  • 22
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Zhu S, Setia S, Jajodia S. LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Proceedings of ACM CCS, 2003; 62-72.
    • (2003) Proceedings of ACM CCS , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 23
    • 3142707201 scopus 로고    scopus 로고
    • Power-conserving computation of order-statistics over sensor networks
    • New York, NY, USA, ACM Press
    • Greenwald MB, Khanna S. Power-conserving computation of order-statistics over sensor networks. In Proceedings of ACM SIGMOD-SIGACT-SIGART PODS, New York, NY, USA, 2004; 275-285. ACM Press.
    • (2004) Proceedings of ACM SIGMOD-SIGACT-SIGART PODS , pp. 275-285
    • Greenwald, M.B.1    Khanna, S.2
  • 24
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • ACM press
    • Liu D, Ning P. Establishing pairwise keys in distributed sensor networks. In Proceedings of ACM CCS, 2003; 52-61. ACM press.
    • (2003) Proceedings of ACM CCS , pp. 52-61
    • Liu, D.1    Ning, P.2
  • 26
    • 2342599620 scopus 로고    scopus 로고
    • Query processing insensor networks
    • Gehrke J, Madden S. Query processing insensor networks. IEEE Pervasive Computing 2004; 3(1): 46-55.
    • (2004) IEEE Pervasive Computing , vol.3 , Issue.1 , pp. 46-55
    • Gehrke, J.1    Madden, S.2
  • 27
    • 67749125921 scopus 로고    scopus 로고
    • Optimizing tree reconfigurationtotrack mobile targets in sensor networks
    • Zhang W, Cao G. Optimizing tree reconfigurationtotrack mobile targets in sensor networks. SIGMOBILE Mobile Computing and Communications Review 2003; 7(3): 39-40.
    • (2003) SIGMOBILE Mobile Computing and Communications Review , vol.7 , Issue.3 , pp. 39-40
    • Zhang, W.1    Cao, G.2
  • 28
    • 3142728212 scopus 로고    scopus 로고
    • Wireless sensor networks: A new regime for time synchronization
    • Elson J, Römer K. Wireless sensor networks: a new regime for time synchronization. ACM SIGCOMM CCR 2003; 33(1): 149-154.
    • (2003) ACM SIGCOMM CCR , vol.33 , Issue.1 , pp. 149-154
    • Elson, J.1    Römer, K.2
  • 29
    • 33144472210 scopus 로고    scopus 로고
    • Secure time synchronization service for sensor networks
    • New York, NY, USA, ACM Press
    • Ganeriwal S, Capkun S, Han C-C, Srivastava MB. Secure time synchronization service for sensor networks. In Proceedings of ACM WISE, New York, NY, USA, 2005; 97-106. ACM Press.
    • (2005) Proceedings of ACM WISE , pp. 97-106
    • Ganeriwal, S.1    Capkun, S.2    Han, C.-C.3    Srivastava, M.B.4
  • 31
    • 1542543737 scopus 로고    scopus 로고
    • Lightweight time synchronization for sensor networks
    • New York, NY, USA, ACM Press
    • van Greunen J, Rabaey J. Lightweight time synchronization for sensor networks. In Proceedings of ACM WSNA, New York, NY, USA, 2003; 11-19. ACM Press.
    • (2003) Proceedings of ACM WSNA , pp. 11-19
    • van Greunen, J.1    Rabaey, J.2
  • 33
    • 33144487909 scopus 로고    scopus 로고
    • Connected sensor cover: Selforganization of sensor networks for efficient query execution
    • Gupta H, Zhou Z, Das SR, Gu Q. Connected sensor cover: selforganization of sensor networks for efficient query execution. IEEE/ACM Transactions on Networking 2006; 14(1): 55-67.
    • (2006) IEEE/ACM Transactions on Networking , vol.14 , Issue.1 , pp. 55-67
    • Gupta, H.1    Zhou, Z.2    Das, S.R.3    Gu, Q.4
  • 35
    • 51249107485 scopus 로고    scopus 로고
    • Topology control for reliable sensor-to-sink data transport in sensor networks
    • Wang J, Medidi S. Topology control for reliable sensor-to-sink data transport in sensor networks. In Proceedings of IEEE ICC, 2008; 3215-3219.
    • (2008) Proceedings of IEEE ICC , pp. 3215-3219
    • Wang, J.1    Medidi, S.2
  • 36
    • 84945300542 scopus 로고    scopus 로고
    • A provably secure additive and multiplicative privacy homomorphism
    • Domingo-Ferrer J. A provably secure additive and multiplicative privacy homomorphism. In Proceedings of IFIP SEC, 2002; 471-483.
    • (2002) Proceedings of IFIP SEC , pp. 471-483
    • Domingo-Ferrer, J.1
  • 39
    • 27544460282 scopus 로고    scopus 로고
    • Distributed detection of node replication attacks in sensor networks
    • Washington, DC, USA
    • Parno B, Perrig A, Gligor VD. Distributed detection of node replication attacks in sensor networks. In Proceedings of IEEE S&P, Washington, DC, USA, 2005; 49-63.
    • (2005) Proceedings of IEEE S&P , pp. 49-63
    • Parno, B.1    Perrig, A.2    Gligor, V.D.3
  • 40
    • 34548126116 scopus 로고    scopus 로고
    • Requirements and open issues in distributed detection of node identity replicas in wsn
    • Conti M, Di Pietro R, Mancini LV, Mei A. Requirements and open issues in distributed detection of node identity replicas in wsn. In Proceedings of IEEE SMC, 2006; 1468-1473.
    • (2006) Proceedings of IEEE SMC , pp. 1468-1473
    • Conti, M.1    Di Pietro, R.2    Mancini, L.V.3    Mei, A.4
  • 41
    • 37849004592 scopus 로고    scopus 로고
    • A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks
    • New York, NY, USA, ACM Press
    • Conti M, Di Pietro R, Mancini LV, Mei A. A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. In Proceedings of MobiHoc '07, New York, NY, USA, 2007; 80-89. ACM Press.
    • (2007) Proceedings of MobiHoc '07 , pp. 80-89
    • Conti, M.1    Di Pietro, R.2    Mancini, L.V.3    Mei, A.4
  • 43
    • 33646581008 scopus 로고    scopus 로고
    • Energy analysis of public-key cryptography for wireless sensor networks
    • Washington, DC, USA, IEEE Computer Society
    • Wander AS, Gura N, Eberle H, Gupta V, Shantz SC. Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of IEEE PERCOM, Washington, DC, USA, 2005; 324-328. IEEE Computer Society.
    • (2005) Proceedings of IEEE PERCOM , pp. 324-328
    • Wander, A.S.1    Gura, N.2    Eberle, H.3    Gupta, V.4    Shantz, S.C.5
  • 44
    • 33745269795 scopus 로고    scopus 로고
    • Survey and benchmark of block ciphers for wireless sensor networks
    • Law YW, Doumen J, Hartel P. Survey and benchmark of block ciphers for wireless sensor networks. ACM Transactions on Sensor Networks 2006; 2(1): 65-93.
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.1 , pp. 65-93
    • Law, Y.W.1    Doumen, J.2    Hartel, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.