메뉴 건너뛰기




Volumn 51, Issue 1, 2009, Pages 179-192

Fault-tolerance data aggregation for clustering wireless sensor network

Author keywords

Clustering sensor network; Data aggregation; Data concealment; Data privacy; Filtering outlier data

Indexed keywords

CLUSTERING SENSOR NETWORK; CONSTRAINED RESOURCES; DATA AGGREGATION; DATA CONCEALMENT; DATA REDUNDANCY; FILTERING OUTLIER DATA; HIERARCHICAL CLUSTERS; NETWORK LIFETIME; NODE COMPROMISE; OPTIMAL STRUCTURES; PRIVACY PRESERVING; PROCESS EFFICIENCY; SIMULATION RESULT; VARIOUS ATTACKS;

EID: 70349567234     PISSN: 09296212     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11277-008-9598-7     Document Type: Article
Times cited : (12)

References (23)
  • 1
    • 70349565196 scopus 로고    scopus 로고
    • Elliptic curve key agreement and key transport protocols
    • American Bankers Association
    • ANSI X9.63. (1999). Elliptic curve key agreement and key transport protocols. American Bankers Association.
    • (1999) ANSI X9.63.
  • 2
    • 15844425036 scopus 로고    scopus 로고
    • Aggregation in sensor networks: An energy-accuracy trade-off
    • DOI 10.1016/S1570-8705(03)00009-X
    • A. Boulis S. Ganeriwal M.B. Srivastava 2003 Aggregation in sensor networks: An energy-accuracy trade-off ElseVier J. Ad Hoc Netw 1 2-3 317 331 10.1016/S1570-8705(03)00009-X (Pubitemid 40421416)
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 317-331
    • Boulis, A.1    Ganeriwal, S.2    Srivastava, M.B.3
  • 6
    • 3042808479 scopus 로고    scopus 로고
    • Strong minimum energy topology in wireless sensor networks: NP completeness and heuristics
    • 10.1109/TMC.2003.1233530
    • X. Cheng B. Narahari R. Simha M.X. Cheng D. Liu 2002 Strong minimum energy topology in wireless sensor networks: NP completeness and heuristics IEEE Trans Mob Comput, 2 3 248 256 10.1109/TMC.2003.1233530
    • (2002) IEEE Trans Mob Comput , vol.2 , Issue.3 , pp. 248-256
    • Cheng, X.1    Narahari, B.2    Simha, R.3    Cheng, M.X.4    Liu, D.5
  • 11
  • 13
    • 0030577321 scopus 로고    scopus 로고
    • A new privacy homomorphism and applications
    • DOI 10.1016/S0020-0190(96)00170-6, PII S0020019096001706
    • D.-F. Josep 1996 A new privacy homomorphism and applications Information Process Lett. 60 5 277 282 10.1016/S0020-0190(96)00170-6 (Pubitemid 126393007)
    • (1996) Information Processing Letters , vol.60 , Issue.5 , pp. 277-282
    • Domingo, I.1    Ferrer, J.2
  • 14
    • 70349581451 scopus 로고    scopus 로고
    • Quantifying eavesdropping vulnerability in sensor networks
    • Proceedings of the 2nd International Workshop on Data Management for Sensor Networks
    • Madhukar, A., Zachary, I., & Insup, L. (2005). Quantifying eavesdropping vulnerability in sensor networks. ACM International Conference Proceeding Series 2005, Vol. 96: Proceedings of the 2nd International Workshop on Data Management for Sensor Networks (pp. 3-9).
    • (2005) ACM International Conference Proceeding Series 2005 , vol.96 , pp. 3-9
    • Madhukar, A.1    Zachary, I.2    Insup, L.3
  • 17
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor
    • 1030.68814 10.1023/A:1016598314198
    • A. Perrig R. Szewczyk 2002 SPINS: Security protocols for sensor J. Wireless Netw. 8 521 534 1030.68814 10.1023/A:1016598314198
    • (2002) J. Wireless Netw. , vol.8 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2
  • 23
    • 33748351402 scopus 로고    scopus 로고
    • Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
    • DOI 10.1109/TMC.2006.144, 1683790
    • D. Westhoff J. Girao M. Schneider 2006 Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation IEEE Trans. Mob. Comput. 5 10 1417 1431 10.1109/TMC.2006.144 (Pubitemid 44335247)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.10 , pp. 1417-1431
    • Westhoff, D.1    Girao, J.2    Acharya, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.