메뉴 건너뛰기




Volumn , Issue , 2009, Pages 197-206

Secure multidimensional range queries in sensor networks

Author keywords

Multidimensional range query; Security; Sensor networks

Indexed keywords

DATA CONFIDENTIALITY; DATA STORAGE; HIGH EFFICACY; HIGH PROBABILITY; HOSTILE ENVIRONMENTS; LARGE SCALE SENSOR NETWORK; MULTI-DIMENSIONAL RANGE QUERIES; PERFORMANCE EVALUATION; QUERY RESULTS; RESOURCE-RICH; SECURITY SENSORS; SENSITIVE DATAS; TEMPORAL RELATIONSHIPS; TWO-TIER ARCHITECTURE;

EID: 70450207961     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1530748.1530777     Document Type: Conference Paper
Times cited : (46)

References (27)
  • 1
    • 84905852894 scopus 로고    scopus 로고
    • TSAR: A two tier sensor storage architecture using interval skip graphs
    • San Diego, California, USA, Nov.
    • P. Desnoyers, D. Ganesan, and P. Shenoy, "TSAR: A two tier sensor storage architecture using interval skip graphs," in ACM SenSys'05, San Diego, California, USA, Nov. 2005, pp. 39-50.
    • (2005) ACM SenSys'05 , pp. 39-50
    • Desnoyers, P.1    Ganesan, D.2    Shenoy, P.3
  • 2
    • 33748074817 scopus 로고    scopus 로고
    • Data storage placement in sensor networks
    • Florence, Italy, May
    • B. Sheng, Q. Li, and W. Mao, "Data storage placement in sensor networks," in ACM MobiHoc'06, Florence, Italy, May 2006, pp. 344-355.
    • (2006) ACM MobiHoc'06 , pp. 344-355
    • Sheng, B.1    Li, Q.2    Mao, W.3
  • 3
    • 34548302064 scopus 로고    scopus 로고
    • PDCS: Security and privacy support for data-centric sensor networks
    • Anchorage, Alaska, USA, May
    • M. Shao, S. Zhu, W. Zhang, and G. Cao, "pDCS: Security and privacy support for data-centric sensor networks," in IEEE INFOCOM'07, Anchorage, Alaska, USA, May 2007, pp. 1298-1306.
    • (2007) IEEE INFOCOM'07 , pp. 1298-1306
    • Shao, M.1    Zhu, S.2    Zhang, W.3    Cao, G.4
  • 4
    • 70349652889 scopus 로고    scopus 로고
    • Verifiable privacy-preserving range query in sensor networks
    • Phoenix, AZ, Apr.
    • B. Sheng and Q. Li, "Verifiable privacy-preserving range query in sensor networks," in IEEE INFOCOM'08, Phoenix, AZ, Apr. 2008, pp. 46-50.
    • (2008) IEEE INFOCOM'08 , pp. 46-50
    • Sheng, B.1    Li, Q.2
  • 6
    • 4243197464 scopus 로고    scopus 로고
    • Multi-dimensional range queries in sensor networks
    • Los Angeles, California, USA, Nov.
    • X. Li, Y. J. Kim, R. Govindan, and W. Hong, "Multi-dimensional range queries in sensor networks," in ACM SenSys'03, Los Angeles, California, USA, Nov. 2003, pp. 63-75.
    • (2003) ACM SenSys'03 , pp. 63-75
    • Li, X.1    Kim, Y.J.2    Govindan, R.3    Hong, W.4
  • 7
    • 23944487783 scopus 로고    scopus 로고
    • TinyDB: An acquisitional query processing system for sensor networks
    • Mar.
    • S. R. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, "TinyDB: an acquisitional query processing system for sensor networks," ACM Trans. Database Syst., vol. 30, no. 1, pp. 122-173, Mar. 2005.
    • (2005) ACM Trans. Database Syst. , vol.30 , Issue.1 , pp. 122-173
    • Madden, S.R.1    Franklin, M.J.2    Hellerstein, J.M.3    Hong, W.4
  • 8
    • 51249105495 scopus 로고    scopus 로고
    • Rethinking data management for storage-centric sensor networks
    • Asilomar, CA, USA, Jan.
    • Y. Diao, D. Ganesan, G. Mathur, and P. J. Shenoy, "Rethinking data management for storage-centric sensor networks," in CIDR'07, Asilomar, CA, USA, Jan. 2007, pp. 22-31.
    • (2007) CIDR'07 , pp. 22-31
    • Diao, Y.1    Ganesan, D.2    Mathur, G.3    Shenoy, P.J.4
  • 9
    • 70349690087 scopus 로고    scopus 로고
    • Secure range queries in tiered sensor networks
    • Rio de Janeiro, Brazil, Apr.
    • J. Shi, R. Zhang, and Y. Zhang, "Secure range queries in tiered sensor networks," in IEEE INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009.
    • (2009) IEEE INFOCOM'09
    • Shi, J.1    Zhang, R.2    Zhang, Y.3
  • 10
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database-service-provider model
    • Madison, Wisconsin
    • H. Hacigümüs, B. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database-service-provider model," in ACM SIGMOD'02, Madison, Wisconsin, 6 2002, pp. 216-227.
    • (2002) ACM SIGMOD'02 , vol.6 , pp. 216-227
    • Hacigümüs, H.1    Iyer, B.2    Li, C.3    Mehrotra, S.4
  • 11
    • 85065578926 scopus 로고    scopus 로고
    • A privacy-preserving index for range queries
    • Toronto, Canada, Aug.
    • B. Hore, S. Mehrotra, and G. Tsudik, "A privacy-preserving index for range queries," in VLDB'04, Toronto, Canada, Aug. 2004, pp. 720-731.
    • (2004) VLDB'04 , pp. 720-731
    • Hore, B.1    Mehrotra, S.2    Tsudik, G.3
  • 13
    • 33947309703 scopus 로고    scopus 로고
    • Secure localization and authentication in ultra-wideband sensor networks
    • DOI 10.1109/JSAC.2005.863855
    • Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," IEEE J. Select. Areas Commun., Special Issue on UWB Wireless Communications - Theory and Applications, vol. 24, no. 4, pp. 829-835, Apr. 2006. (Pubitemid 46438080)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.4 , pp. 829-835
    • Zhang, Y.1    Liu, W.2    Fang, Y.3    Wu, D.4
  • 14
    • 29844438193 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
    • Urbana-Champaign, IL, USA, May
    • W. Zhang, H. Song, S. Zhu, and G. Cao, "Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks," in ACM MobiHoc'05, Urbana-Champaign, IL, USA, May 2005, pp. 378-389.
    • (2005) ACM MobiHoc'05 , pp. 378-389
    • Zhang, W.1    Song, H.2    Zhu, S.3    Cao, G.4
  • 15
    • 0038341106 scopus 로고    scopus 로고
    • A key-management scheme for distributed sensor networks
    • Washington, DC, Nov.
    • L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in ACM CCS'02, Washington, DC, Nov. 2002, pp. 41-47.
    • (2002) ACM CCS'02 , pp. 41-47
    • Eschenauer, L.1    Gligor, V.2
  • 16
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Oakland, CA, May
    • H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in IEEE S&P'03, Oakland, CA, May 2003, pp. 197-213.
    • (2003) IEEE S&P'03 , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 17
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Washington, DC, Oct.
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP: Efficient security mechanisms for large-scale distributed sensor networks," in ACM CCS'03, Washington, DC, Oct. 2003, pp. 62-72.
    • (2003) ACM CCS'03 , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 18
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Washington, DC, Oct.
    • D. Liu and P. Ning, "Establishing pairwise keys in distributed sensor networks," in ACM CCS'03, Washington, DC, Oct. 2003, pp. 52-61.
    • (2003) ACM CCS'03 , pp. 52-61
    • Liu, D.1    Ning, P.2
  • 19
    • 33144476837 scopus 로고    scopus 로고
    • Location-based compromise-tolerant security mechanisms for wireless sensor networks
    • DOI 10.1109/JSAC.2005.861382
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-based compromise-tolerant security mechanisms for wireless sensor networks," IEEE J. Select. Areas Commun., Special Issue on Security in Wireless Ad Hoc Networks, vol. 24, no. 2, pp. 247-260, Feb. 2006. (Pubitemid 43269747)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 20
    • 34548205306 scopus 로고    scopus 로고
    • IPAK: An in-situ pairwise key bootstrapping scheme for wireless sensor networks
    • Aug.
    • L. Ma, X. Cheng, F. Liu, F. An, and M. Rivera, "iPAK: An in-situ pairwise key bootstrapping scheme for wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 8, pp. 1174-1184, Aug. 2007.
    • (2007) IEEE Trans. Parallel Distrib. Syst. , vol.18 , Issue.8 , pp. 1174-1184
    • Ma, L.1    Cheng, X.2    Liu, F.3    An, F.4    Rivera, M.5
  • 21
    • 70349658629 scopus 로고    scopus 로고
    • DP2AC: Distributed privacy-preserving access control in sensor networks
    • Rio de Janeiro, Brazil, Apr.
    • R. Zhang, Y. Zhang, and K. Ren, "DP2AC: Distributed privacy-preserving access control in sensor networks," in IEEE INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009.
    • (2009) IEEE INFOCOM'09
    • Zhang, R.1    Zhang, Y.2    Ren, K.3
  • 22
    • 70349659577 scopus 로고    scopus 로고
    • Dependable and secure sensor data storage with dynamic integrity assurance
    • Rio de Janeiro, Brazil, Apr.
    • Q. Wang, K. Ren, W. Lou, and Y. Zhang, "Dependable and secure sensor data storage with dynamic integrity assurance," in IEEE INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009.
    • (2009) IEEE INFOCOM'09
    • Wang, Q.1    Ren, K.2    Lou, W.3    Zhang, Y.4
  • 23
    • 26444532494 scopus 로고    scopus 로고
    • OCB: A block-cipher mode of operation for efficient authenticated encryption
    • Aug.
    • P. Rogaway, M. Bellare, and J. Black, "OCB: A block-cipher mode of operation for efficient authenticated encryption," ACM Trans. Inf. Syst. Secur., vol. 6, no. 3, pp. 365-403, Aug. 2003.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.3 , pp. 365-403
    • Rogaway, P.1    Bellare, M.2    Black, J.3
  • 24
    • 85000276942 scopus 로고    scopus 로고
    • Multilevel μTESLA: Broadcast authentication for distributed sensor networks
    • D. Liu and P. Ning, "Multilevel μTESLA: Broadcast authentication for distributed sensor networks," Trans. on Embedded Computing Sys., vol. 3, no. 4, pp. 800-836, 2004.
    • (2004) Trans. on Embedded Computing Sys. , vol.3 , Issue.4 , pp. 800-836
    • Liu, D.1    Ning, P.2
  • 26
    • 51249087814 scopus 로고    scopus 로고
    • TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks
    • St. Louis, MO, Apr.
    • A. Liu and P. Ning, "TinyECC: A configurable library for elliptic curve cryptography in wireless sensor networks," in IPSN'08, St. Louis, MO, Apr. 2008, pp. 245-256.
    • (2008) IPSN'08 , pp. 245-256
    • Liu, A.1    Ning, P.2
  • 27
    • 51849154205 scopus 로고    scopus 로고
    • Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control
    • Beijing, China, Jun.
    • H. Wang, B. Sheng, C. C. Tan, and Q. Li, "Comparing symmetric-key and public-key based security schemes in sensor networks: A case study of user access control," in ICDCS'08, Beijing, China, Jun. 2008, pp. 11-18.
    • (2008) ICDCS'08 , pp. 11-18
    • Wang, H.1    Sheng, B.2    Tan, C.C.3    Li, Q.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.