메뉴 건너뛰기




Volumn , Issue , 2009, Pages 954-962

Dependable and secure sensor data storage with dynamic integrity assurance

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRAIC SIGNATURES; BYZANTINE FAILURES; DATA COMPONENTS; DATA INTEGRITY; DATA MANAGEMENT; DATA SHARE; DATA STORAGE; DATA STORAGE SYSTEMS; DISTRIBUTED ARCHITECTURE; DISTRIBUTED DATA; DISTRIBUTION SCHEME; DYNAMIC INTEGRITY; ERASURE CODING; FAULT-TOLERANT; POLLUTION ATTACK; PROTOCOL EXECUTION; RESOURCE-CONSTRAINED; SECRET SHARING; SECURE DATA STORAGE; SECURITY AND PERFORMANCE; SECURITY DESIGN; SENSOR DATA; SHARE GENERATION; VARIOUS ATTACKS;

EID: 70349659577     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2009.5062006     Document Type: Conference Paper
Times cited : (73)

References (26)
  • 2
    • 35348872361 scopus 로고    scopus 로고
    • Capsule: An energy-optimized object storage system for memory-constrained sensor devices
    • G. Mathur, P. Desnoyers, D. Ganesan, and P. Shenoy, "Capsule: An energy-optimized object storage system for memory-constrained sensor devices," in Proc. ACM Sensys, 2006.
    • (2006) Proc. ACM Sensys
    • Mathur, G.1    Desnoyers, P.2    Ganesan, D.3    Shenoy, P.4
  • 3
    • 84869610942 scopus 로고    scopus 로고
    • "Mica motes," http://www.xbow.com/Products/.
    • Mica motes1
  • 5
    • 38049010337 scopus 로고    scopus 로고
    • Tsar: A two tier sensor storage architecture using interval skip graphs
    • P. Desnoyers, D. Ganesan, and P. Shenoy, "Tsar: a two tier sensor storage architecture using interval skip graphs," in Proc. ACM Sensys, 2005.
    • (2005) Proc. ACM Sensys
    • Desnoyers, P.1    Ganesan, D.2    Shenoy, P.3
  • 6
    • 84869609167 scopus 로고    scopus 로고
    • "Mica z," http://www.xbow.com/Products/.
    • Mica z1
  • 7
    • 3543100577 scopus 로고    scopus 로고
    • Stastical en-route filtering of injected false data in sensor networks
    • F. Ye, H. Luo, S. Lu, and L. Zhang, "Stastical en-route filtering of injected false data in sensor networks," in Proc. IEEE INFOCOM, 2004.
    • (2004) Proc. IEEE INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 9
    • 33646834914 scopus 로고    scopus 로고
    • A new approach for random key predistribution in large-scale wireless sensor networks
    • K. Ren, K. Zeng, and W. Lou, "A new approach for random key predistribution in large-scale wireless sensor networks," Journal of Wireless Communication and Mobile Computing, vol. 6, no. 3, pp. 307-318, 2006.
    • (2006) Journal of Wireless Communication and Mobile Computing , vol.6 , Issue.3 , pp. 307-318
    • Ren, K.1    Zeng, K.2    Lou, W.3
  • 10
    • 41449098948 scopus 로고    scopus 로고
    • Leds: Providing location-aware endto-end data security in wireless sensor networks
    • May
    • K. Ren, W. Lou, and Y. Zhang, "Leds: Providing location-aware endto-end data security in wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 7, no. 5, pp. 585-598, May 2008.
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , Issue.5 , pp. 585-598
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 12
    • 34249316910 scopus 로고    scopus 로고
    • Tinypeds: Tiny persistent encrypted data storage in asynchronous wireless sensor networks
    • J. Girao, D. Westhoff, E. Mykletun, and T. Araki, "Tinypeds: Tiny persistent encrypted data storage in asynchronous wireless sensor networks," Ad Hoc Networks, Elsevier, vol. 5, no. 7, pp. 1073-1089, 2007.
    • (2007) Ad Hoc Networks, Elsevier , vol.5 , Issue.7 , pp. 1073-1089
    • Girao, J.1    Westhoff, D.2    Mykletun, E.3    Araki, T.4
  • 15
    • 35048880121 scopus 로고    scopus 로고
    • Dependable and secure data storage in wireless ad hoc networks: An assessment of ds2
    • S. Chessa, R. D. Pietro, and P. Maestrini, "Dependable and secure data storage in wireless ad hoc networks: an assessment of ds2," in Proc. WONS, 2004.
    • (2004) Proc. WONS
    • Chessa, S.1    Pietro, R.D.2    Maestrini, P.3
  • 16
    • 29844438193 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
    • W. Zhang, H. Song, S. Zhu, and G. Cao, "Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks," in Proc. ACM MOBIHOC, 2005.
    • (2005) Proc. ACM MOBIHOC
    • Zhang, W.1    Song, H.2    Zhu, S.3    Cao, G.4
  • 18
    • 34547645758 scopus 로고    scopus 로고
    • Securing distributed data storage and retrieval in sensor networks
    • N. Subramanian, C. Yang, and W. Zhang, "Securing distributed data storage and retrieval in sensor networks," in Proc. IEEE PerCom, 2007.
    • (2007) Proc. IEEE PerCom
    • Subramanian, N.1    Yang, C.2    Zhang, W.3
  • 19
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • April
    • M. O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," Journal of the ACM, vol. 36, no. 2, pp. 335-348, April 1989.
    • (1989) Journal of the ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 20
    • 85028765277 scopus 로고
    • Advances in Cryptology (CRYPTO'92), LNCS
    • C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure key distribution for dynamic conferences," Advances in Cryptology (CRYPTO'92), LNCS, vol. 740, pp. 471-486, 1993.
    • (1993) , vol.740 , pp. 471-486
    • Blundo, C.1    Santis, A.D.2    Herzberg, A.3    Kutten, S.4    Vaccaro, U.5    Yung, M.6
  • 21
    • 0018545449 scopus 로고
    • How to share a secret
    • Nov
    • A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 22
  • 23
    • 2442531720 scopus 로고    scopus 로고
    • Algebraic signature for scalable distributed data structure
    • W. Litwin and T. Schwarz, "Algebraic signature for scalable distributed data structure," in Proc. ICDE, 2004.
    • (2004) Proc. ICDE
    • Litwin, W.1    Schwarz, T.2
  • 24
    • 70349675101 scopus 로고    scopus 로고
    • Verification of parity data in large scale storage systems
    • T. Schwarz, "Verification of parity data in large scale storage systems," in Proc. PDPTA, 2004.
    • (2004) Proc. PDPTA
    • Schwarz, T.1
  • 25
    • 33947694320 scopus 로고    scopus 로고
    • Store, forget and check: Using algebraic signature to check remotely administered storage
    • T. Schwarz and E. Miller, "Store, forget and check: Using algebraic signature to check remotely administered storage," in Proc. ICDCS, 2006.
    • (2006) Proc. ICDCS
    • Schwarz, T.1    Miller, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.