메뉴 건너뛰기




Volumn 9, Issue 7, 2009, Pages 5324-5338

Secure many-to-one communications in wireless sensor networks

Author keywords

Many to one communications; Security; Sensors; Wsn

Indexed keywords

AGGREGATION STRATEGY; IMPLOSION PROBLEMS; MANY-TO-ONE COMMUNICATIONS; POWER RESOURCES; SECURITY; SECURITY MEASURE; SECURITY PROBLEMS; WSN;

EID: 77952499383     PISSN: 14248220     EISSN: None     Source Type: Journal    
DOI: 10.3390/s90705324     Document Type: Review
Times cited : (6)

References (36)
  • 1
    • 84876606620 scopus 로고    scopus 로고
    • Crossbow Technology Company: San Jose, CA, USA; Available online, accessed May 06
    • Crossbow Technology Company: San Jose, CA, USA; Available online: http://www.xbow.com/, accessed May 06, 2009.
    • (2009)
  • 4
    • 84876619832 scopus 로고    scopus 로고
    • IP multicast applications: Challenges and solutions
    • Available online, accessed May 06
    • Quinn, B.; Almeroth, K. IP multicast applications: Challenges and solutions. Internet RFC 3170. Available online: http://www.ietf.org, accessed May 06, 2009.
    • (2009) Internet RFC 3170
    • Quinn, B.1    Almeroth, K.2
  • 5
    • 33745759519 scopus 로고    scopus 로고
    • Authenticated queries in sensor networks
    • Benenson, Z. Authenticated queries in sensor networks. Lect. Notes Comput. Sc. 2005, 3813, 54-67.
    • (2005) Lect. Notes Comput. Sc , vol.3813 , pp. 54-67
    • Benenson, Z.1
  • 6
    • 0017930809 scopus 로고
    • A Method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R.L.; Shamir, A.; Adleman, L. A Method for obtaining digital signatures and public-key cryptosystems. CACM 1978, 21, 120-126.
    • (1978) CACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 9
    • 33750904440 scopus 로고    scopus 로고
    • Unleashing public-key cryptography in wireless sensor networks
    • Lopez, J. Unleashing public-key cryptography in wireless sensor networks. J. Comput. Sec. 2006, 14,469-482.
    • (2006) J. Comput. Sec , vol.14 , pp. 469-482
    • Lopez, J.1
  • 10
    • 0242270877 scopus 로고    scopus 로고
    • Aggregated hierarchical multicast a many-to-many communication paradigm using programmable networks
    • Wolf, T.; Choi, S.Y. Aggregated hierarchical multicast a many-to-many communication paradigm using programmable networks. IEEE T. Syst. Man Cybe. Part C 2003, 33, 358-369.
    • (2003) IEEE T. Syst. Man Cybe. Part C , vol.33 , pp. 358-369
    • Wolf, T.1    Choi, S.Y.2
  • 12
    • 33646340128 scopus 로고    scopus 로고
    • Secure acknowledgment aggregation and multisignatures with limited robustness. Comput
    • Castelluccia, C.; Jarecki, S.; Kim, J.; Tsudik, G. Secure acknowledgment aggregation and multisignatures with limited robustness. Comput. Networks 2006, 50, 1639-1652.
    • (2006) Networks , vol.50 , pp. 1639-1652
    • Castelluccia, C.1    Jarecki, S.2    Kim, J.3    Tsudik, G.4
  • 13
    • 35248880074 scopus 로고    scopus 로고
    • Efficient threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-group signature scheme
    • Boldyreva, A. Efficient threshold signatures, multisignatures and blind signatures based on the Gap-Diffie-Hellman-group signature scheme. Lect. Notes Comput. Sc. 2003, 2567, 31-46.
    • (2003) Lect. Notes Comput. Sc , vol.2567 , pp. 31-46
    • Boldyreva, A.1
  • 14
  • 16
    • 84956852274 scopus 로고    scopus 로고
    • A new public-key cryptosystem as secure as factoring
    • Okamoto, T.; Uchiyama, S. A new public-key cryptosystem as secure as factoring. Lect. Notes Comput. Sc. 1998, 1403, 308-318.
    • (1998) Lect. Notes Comput. Sc , vol.1403 , pp. 308-318
    • Okamoto, T.1    Uchiyama, S.2
  • 17
    • 33749642078 scopus 로고    scopus 로고
    • Scalability and security in biased many-to-one communication
    • Sebé, F.; Domingo-Ferrer, J. Scalability and security in biased many-to-one communication. Comput. Networks 2007, 51, 1-13.
    • (2007) Comput. Networks , vol.51 , pp. 1-13
    • Sebé, F.1    Domingo-Ferrer, J.2
  • 19
    • 33745312679 scopus 로고    scopus 로고
    • Efficient mechanisms for secure inter-node and aggregation processing in sensor networks
    • Dimitriou, T. Efficient mechanisms for secure inter-node and aggregation processing in sensor networks. Lect. Notes Comput. Sc. 2005, 3738, 18-31.
    • (2005) Lect. Notes Comput. Sc , vol.3738 , pp. 18-31
    • Dimitriou, T.1
  • 20
    • 38449121748 scopus 로고    scopus 로고
    • Securing communication trees in sensor networks
    • Dimitriou, T. Securing communication trees in sensor networks. Lect. Notes Comput. Sc. 2006, 4240,47-58.
    • (2006) Lect. Notes Comput. Sc , vol.4240 , pp. 47-58
    • Dimitriou, T.1
  • 25
    • 35048828372 scopus 로고    scopus 로고
    • Efficient secure aggregation in sensor networks
    • Jadia, P.; Mathuria, A. Efficient secure aggregation in sensor networks. Lect. Notes Comput. Sc. 2004,3296,40-49.
    • (2004) Lect. Notes Comput. Sc , vol.3296 , pp. 40-49
    • Jadia, P.1    Mathuria, A.2
  • 26
    • 0023408117 scopus 로고
    • Processing encrypted data
    • Ahituv, N.; Lapid, Y.; Neumann, S. Processing encrypted data. CACM 1987, 30, 777-780.
    • (1987) CACM , vol.30 , pp. 777-780
    • Ahituv, N.1    Lapid, Y.2    Neumann, S.3
  • 29
    • 33748351402 scopus 로고    scopus 로고
    • Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaption
    • Westhoff, D.; Girao, J.; Acharya, M. Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaption. IEEE Trans. Mob. Comput. 2006,5,1417-1431.
    • (2006) IEEE Trans. Mob. Comput , vol.5 , pp. 1417-1431
    • Westhoff, D.1    Girao, J.2    Acharya, M.3
  • 31
    • 67749118172 scopus 로고    scopus 로고
    • Confidentiality and integrity for data aggregation in WSN using peer monitoring
    • Di Pietro, R.; Michiardi, P.; Molva, R. Confidentiality and integrity for data aggregation in WSN using peer monitoring. Secur. Commun. Networks J. 2009, 2, 181-194.
    • (2009) Secur. Commun. Networks J , vol.2 , pp. 181-194
    • di Pietro, R.1    Michiardi, P.2    Molva, R.3
  • 35
    • 34247495512 scopus 로고    scopus 로고
    • Secure many-to-one symbol transmission for implementation on smart cards
    • Sebé, F.; Viejo, A.; Domingo-Ferrer, J. Secure many-to-one symbol transmission for implementation on smart cards. Comput. Networks 2007, 51, 2299-2307.
    • (2007) Comput. Networks , vol.51 , pp. 2299-2307
    • Sebé, F.1    Viejo, A.2    Domingo-Ferrer, J.3
  • 36
    • 44549083870 scopus 로고    scopus 로고
    • Secure and scalable many-to-one symbol transmission for sensor networks
    • Viejo, A.; Sebé, F.; Domingo-Ferrer, J. Secure and scalable many-to-one symbol transmission for sensor networks. Comput. Commun. 2008, 31, 2408-2413.
    • (2008) Comput. Commun , vol.31 , pp. 2408-2413
    • Viejo, A.1    Sebé, F.2    Domingo-Ferrer, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.