메뉴 건너뛰기




Volumn , Issue , 2009, Pages 945-953

Secure range queries in tiered sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

DATA CONFIDENTIALITY; DATA STORAGE; EVENT DRIVEN; HIGH EFFICACY; HIGH PROBABILITY; HOSTILE ENVIRONMENTS; INCOMPLETE DATA; PERFORMANCE EVALUATION; QUERY RESULTS; RANGE QUERY; RESOURCE-RICH; SENSITIVE DATAS; TEMPORAL RELATIONSHIPS;

EID: 70349690087     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2009.5062005     Document Type: Conference Paper
Times cited : (84)

References (22)
  • 2
    • 84905852894 scopus 로고    scopus 로고
    • TSAR: A two tier sensor storage architecture using interval skip graphs
    • San Diego, California, USA, Nov
    • P. Desnoyers, D. Ganesan, and P. Shenoy, "TSAR: A two tier sensor storage architecture using interval skip graphs," in ACM SenSys'05, San Diego, California, USA, Nov. 2005, pp. 39-50.
    • (2005) ACM SenSys'05 , pp. 39-50
    • Desnoyers, P.1    Ganesan, D.2    Shenoy, P.3
  • 4
    • 33748074817 scopus 로고    scopus 로고
    • Data storage placement in sensor networks
    • Florence, Italy, May
    • B. Sheng, Q. Li, and W. Mao, "Data storage placement in sensor networks," in ACM MobiHoc'06, Florence, Italy, May 2006, pp. 344-355.
    • (2006) ACM MobiHoc'06 , pp. 344-355
    • Sheng, B.1    Li, Q.2    Mao, W.3
  • 5
    • 70349652889 scopus 로고    scopus 로고
    • Verifiable privacy-preserving range query in twotiered sensor networks
    • Phoenix, AZ, April
    • B. sheng and Q. Li, "Verifiable privacy-preserving range query in twotiered sensor networks," in IEEE INFOCOM'08, Phoenix, AZ, April 2008, pp. 46-50.
    • (2008) IEEE INFOCOM'08 , pp. 46-50
    • sheng, B.1    Li, Q.2
  • 6
    • 4243197464 scopus 로고    scopus 로고
    • Multi-dimensional range queries in sensor networks
    • Los Angeles, California, USA, Nov
    • X. Li, Y. J. Kim, R. Govindan, and W. Hong, "Multi-dimensional range queries in sensor networks," in ACM SenSys'03, Los Angeles, California, USA, Nov. 2003, pp. 63-75.
    • (2003) ACM SenSys'03 , pp. 63-75
    • Li, X.1    Kim, Y.J.2    Govindan, R.3    Hong, W.4
  • 7
    • 23944487783 scopus 로고    scopus 로고
    • TinyDB: An acquisitional query processing system for sensor networks
    • Mar
    • S. R. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, "TinyDB: an acquisitional query processing system for sensor networks," ACM Trans. Database Syst., vol. 30, no. 1, pp. 122-173, Mar. 2005.
    • (2005) ACM Trans. Database Syst , vol.30 , Issue.1 , pp. 122-173
    • Madden, S.R.1    Franklin, M.J.2    Hellerstein, J.M.3    Hong, W.4
  • 8
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Madison, Wisconsin
    • H. Hacigümüş, B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database-service-provider model," in ACM SIGMOD'02, Madison, Wisconsin, 6 2002, pp. 216-227.
    • (2002) ACM SIGMOD'02 , vol.6 , pp. 216-227
    • Hacigümüş, H.1    Iyer, B.2    Li, C.3    Mehrotra, S.4
  • 10
    • 26444532494 scopus 로고    scopus 로고
    • OCB: A block-cipher mode of operation for efficient authenticated encryption
    • P. Rogaway, M. Bellare, and J. Black, "OCB: A block-cipher mode of operation for efficient authenticated encryption," ACM Trans. Inf. Syst. Secur., vol. 6, no. 3, pp. 365-403, 2003.
    • (2003) ACM Trans. Inf. Syst. Secur , vol.6 , Issue.3 , pp. 365-403
    • Rogaway, P.1    Bellare, M.2    Black, J.3
  • 11
    • 29844438193 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
    • Urbana-Champaign, IL, USA, May
    • W. Zhang, H. Song, S. Zhu, and G. Cao, "Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks," in ACM MobiHoc'05, Urbana-Champaign, IL, USA, May 2005, pp. 378-389.
    • (2005) ACM MobiHoc'05 , pp. 378-389
    • Zhang, W.1    Song, H.2    Zhu, S.3    Cao, G.4
  • 12
    • 41449098948 scopus 로고    scopus 로고
    • LEDS: Providing location-aware endto-end data security in wireless sensor networks
    • May
    • K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing location-aware endto-end data security in wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 7, no. 5, pp. 585-598, May 2008.
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , Issue.5 , pp. 585-598
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 13
    • 33947309703 scopus 로고    scopus 로고
    • Y. Zhang, W. Liu, Y. Fang, and D. Wu, Secure localization and authentication in ultra-wideband sensor networks, IEEE J. Select. Areas Commun., Special Issue on UWB Wireless Communications - Theory and Applications, 24, no. 4, pp. 829-835, Apr. 2006.
    • Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," IEEE J. Select. Areas Commun., Special Issue on UWB Wireless Communications - Theory and Applications, vol. 24, no. 4, pp. 829-835, Apr. 2006.
  • 14
    • 33750012404 scopus 로고    scopus 로고
    • Y. Zhou, Y. Zhang, and Y. Fang, Access control in wireless sensor networks, Ad Hoc Networks, Special Issue on Security in Ad Hoc and Sensor Networks, 5, no. 1, pp. 3-13, Jan. 2007.
    • Y. Zhou, Y. Zhang, and Y. Fang, "Access control in wireless sensor networks," Ad Hoc Networks, Special Issue on Security in Ad Hoc and Sensor Networks, vol. 5, no. 1, pp. 3-13, Jan. 2007.
  • 15
    • 34547411877 scopus 로고    scopus 로고
    • A two-layer key establishment scheme for wireless sensor networks
    • September
    • Y. Zhou and Y. Fang, "A two-layer key establishment scheme for wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 6, no. 9, pp. 1009-1020, September 2007.
    • (2007) IEEE Transactions on Mobile Computing , vol.6 , Issue.9 , pp. 1009-1020
    • Zhou, Y.1    Fang, Y.2
  • 16
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • Washington, DC, Nov
    • L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in ACM CCS'02, Washington, DC, Nov. 2002, pp. 41-47.
    • (2002) ACM CCS'02 , pp. 41-47
    • Eschenauer, L.1    Gligor, V.2
  • 17
    • 3042783638 scopus 로고    scopus 로고
    • A pairwise key predistribution scheme for wireless sensor networks
    • Washington, DC, Oct
    • W. Du, J. Deng, Y. Han, and P. Varshney, "A pairwise key predistribution scheme for wireless sensor networks," in ACM CCS, Washington, DC, Oct. 2003, pp. 42-51.
    • (2003) ACM CCS , pp. 42-51
    • Du, W.1    Deng, J.2    Han, Y.3    Varshney, P.4
  • 18
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Washington, DC, Oct
    • D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in ACM CCS'03, Washington, DC, Oct. 2003, pp. 52-61.
    • (2003) ACM CCS'03 , pp. 52-61
    • Liu, D.1    Ning, P.2
  • 19
    • 11244264140 scopus 로고    scopus 로고
    • SeRLoc: Secure range-independent localization for wireless sensor networks
    • Philadelphia, PA, Oct
    • L. Lazos and R. Poovendran, "SeRLoc: Secure range-independent localization for wireless sensor networks," in ACM WiSe'04, Philadelphia, PA, Oct. 2004, pp. 21-30.
    • (2004) ACM WiSe'04 , pp. 21-30
    • Lazos, L.1    Poovendran, R.2
  • 20
    • 33144476837 scopus 로고    scopus 로고
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, Location-based compromise tolerant security mechanisms for wireless sensor networks, IEEE J. Select. Areas Commun., Special Issue on Security in Wireless Ad Hoc Networks, 24, no. 2, pp. 247-260, Feb. 2006.
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-based compromise tolerant security mechanisms for wireless sensor networks," IEEE J. Select. Areas Commun., Special Issue on Security in Wireless Ad Hoc Networks, vol. 24, no. 2, pp. 247-260, Feb. 2006.
  • 22
    • 33747142749 scopus 로고    scopus 로고
    • The capacity of wireless networks
    • Mar
    • P. Gupta and P. Kumar, "The capacity of wireless networks," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 388-404, Mar. 2000.
    • (2000) IEEE Trans. Inf. Theory , vol.46 , Issue.2 , pp. 388-404
    • Gupta, P.1    Kumar, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.