메뉴 건너뛰기




Volumn 3, Issue , 2009, Pages 168-175

Privacy-preserving integrity-assured data aggregation in sensor networks

Author keywords

[No Author keywords available]

Indexed keywords

DATA AGGREGATION; NETWORK TRAFFIC; PRIVACY PRESERVING;

EID: 70849117519     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSE.2009.389     Document Type: Conference Paper
Times cited : (21)

References (21)
  • 1
    • 33744499939 scopus 로고    scopus 로고
    • Secure comparison of encrypted data in wireless sensor networks
    • M. Acharya, J. Girao, D. Westhoff. Secure comparison of encrypted data in wireless sensor networks. WiOpt 2005.
    • (2005) WiOpt
    • Acharya, M.1    Girao, J.2    Westhoff, D.3
  • 5
    • 0002757750 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • M. Bellare, R. Canetti, H. Krawczyk. Keying hash functions for message authentication. Crypto 1996.
    • (1996) Crypto
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 6
    • 33749525209 scopus 로고    scopus 로고
    • Efficient aggregation of encrypted data in wireless sensor networks
    • C. Castelluccia, E. Mykletun, G. Tsudik. Efficient aggregation of encrypted data in wireless sensor networks. MobiQuitous 2005.
    • (2005) MobiQuitous
    • Castelluccia, C.1    Mykletun, E.2    Tsudik, G.3
  • 7
    • 33845747795 scopus 로고    scopus 로고
    • Secure hierarchical innetwork aggregation in sensor networks
    • H. Chan, A. Perrig, D. Song. Secure hierarchical innetwork aggregation in sensor networks. CCS 2006.
    • (2006) CCS
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 8
    • 70849089837 scopus 로고    scopus 로고
    • A witness-based approach for data fusion assurance in WSN
    • W. Du, J. Deng, Y. Han, P. Varshney. A witness-based approach for data fusion assurance in WSN. Globecom, 2003.
    • (2003) Globecom
    • Du, W.1    Deng, J.2    Han, Y.3    Varshney, P.4
  • 10
    • 56749178915 scopus 로고    scopus 로고
    • Efficient integritypreserving scheme for hierarchical sensor aggregation
    • K. Frikken, J. A. Dougherty IV. Efficient integritypreserving scheme for hierarchical sensor aggregation. WiSec 2008.
    • (2008) WiSec
    • Frikken, K.1    Dougherty IV, J.A.2
  • 12
    • 0024686013 scopus 로고
    • Residential energy monitoring and computerized surveillance via utility power flows
    • June
    • G. W. Hart. Residential energy monitoring and computerized surveillance via utility power flows. IEEE Technology and Society June 1989.
    • (1989) IEEE Technology and Society
    • Hart, G.W.1
  • 13
    • 84943753034 scopus 로고    scopus 로고
    • Secure aggregation for wireless networks
    • L. Hu, D. Evans. Secure aggregation for wireless networks. WSAAN 2003.
    • (2003) WSAAN
    • Hu, L.1    Evans, D.2
  • 14
    • 4544244334 scopus 로고    scopus 로고
    • SIA: Secure information aggregation in sensor networks
    • B. Przydatek, D. Song, A. Perrig. SIA: Secure information aggregation in sensor networks. ACM Sensys 2003.
    • (2003) ACM Sensys
    • Przydatek, B.1    Song, D.2    Perrig., A.3
  • 16
    • 70849094465 scopus 로고    scopus 로고
    • Efficient handling of adversary attacks in aggregation applications
    • G. Taban, V. D. Gligor. Efficient handling of adversary attacks in aggregation applications. ESORICS 2008.
    • (2008) ESORICS
    • Taban, G.1    Gligor, V.D.2
  • 17
    • 51849117034 scopus 로고    scopus 로고
    • Don't sweat your privacy: Using humidity to detect human presence
    • un Han, A. Jain, M. Luk, A. Perrig. Don't sweat your privacy: Using humidity to detect human presence. UbiPriv 2007.
    • (2007) UbiPriv
    • Han, U.1    Jain, A.2    Luk, M.3    Perrig, A.4
  • 18
    • 14844300164 scopus 로고    scopus 로고
    • Resilient aggregation in sensor networks
    • D. Wagner. Resilient aggregation in sensor networks. ACM SASN 2004.
    • (2004) ACM SASN
    • Wagner, D.1
  • 19
    • 33748351402 scopus 로고    scopus 로고
    • Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution and routing adaptation
    • Oct.
    • D. Westhoff, J. Girao, M. Schneider. Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution and routing adaptation. IEEE TMC, Oct 2006.
    • (2006) IEEE TMC
    • Westhoff, D.1    Girao, J.2    Schneider, M.3
  • 20
    • 34248672225 scopus 로고    scopus 로고
    • SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
    • Y. Yang, X. Wang, S. Zhu, G. Cao. SDAP: A secure hop-by-hop data aggregation protocol for sensor networks. ACM MobiHoc 2006.
    • (2006) ACM MobiHoc
    • Yang, Y.1    Wang, X.2    Zhu, S.3    Cao, G.4
  • 21
    • 70849088196 scopus 로고    scopus 로고
    • A trust based framework for secure data aggregation in wireless sensor networks
    • W. Zhang, S. Das, Y. Liu. A trust based framework for secure data aggregation in wireless sensor networks. IEEE SECON 2006.
    • (2006) IEEE SECON
    • Zhang, W.1    Das, S.2    Liu., Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.