메뉴 건너뛰기




Volumn 16, Issue 4, 2010, Pages 915-927

Secure encrypted-data aggregation for wireless sensor networks

Author keywords

Data aggregation; Privacy; Secrecy; Sensor networks; Wireless

Indexed keywords

AGGREGATION FUNCTIONS; AGGREGATION METHODS; CHOSEN-PLAINTEXT ATTACK; CIPHERTEXTS; COMMUNICATION OVERHEADS; CONVENTIONAL SCHEMES; DATA AGGREGATION; KEY MANAGEMENT; KNOWN-PLAINTEXT ATTACKS; MAN IN THE MIDDLE ATTACKS; PLAINTEXT; REDUNDANT SENSORS; SECURITY AND PRIVACY; SENSOR PLATFORM;

EID: 77954086746     PISSN: 10220038     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11276-009-0177-y     Document Type: Article
Times cited : (59)

References (40)
  • 6
    • 32644435647 scopus 로고    scopus 로고
    • Energy-efficient secure pattern based data aggregation for wireless sensor networks
    • DOI 10.1016/j.comcom.2004.12.029, PII S0140366405000411
    • H Cam S Ozdemir P Nair D Muthuavinashinappan H Ozgur Sanli 2006 ESPDA: Energy-efficient secure pattern based data aggregation for wireless sensor networks Computer Communication 29 446 455 10.1016/j.comcom.2004.12.029 (Pubitemid 43243228)
    • (2006) Computer Communications , vol.29 , Issue.4 , pp. 446-455
    • Cam, H.1    Ozdemir, S.2    Nair, P.3    Muthuavinashiappan, D.4    Ozgur Sanli, H.5
  • 7
    • 33744508153 scopus 로고    scopus 로고
    • A hierarchical energy-efficient framework for data aggregation in wireless sensor networks
    • DOI 10.1109/TVT.2006.873841
    • Y Chen A Liestman J Liu 2006 A hierachical energy-efficient framework for data aggregation in wireless sensor networks IEEE Transactions on Vehicular Technology 55 789 796 10.1109/TVT.2006.873841 10.1109/TVT.2006.873841 (Pubitemid 43811477)
    • (2006) IEEE Transactions on Vehicular Technology , vol.55 , Issue.3 , pp. 789-796
    • Chen, Y.P.1    Liestman, A.L.2    Liu, J.3
  • 8
    • 83255190914 scopus 로고    scopus 로고
    • Aggregation time control algorithm for time constrained data delivery in wireless sensor networks
    • Choi, J., Lee, J., Lee, K., Choi, S., Kwon, W., & Park, H. (2006). Aggregation time control algorithm for time constrained data delivery in wireless sensor networks. In Proceedings of vehiculare technology (pp. 563-567).
    • (2006) Proceedings of Vehiculare Technology , pp. 563-567
    • Choi, J.1    Lee, J.2    Lee, K.3    Choi, S.4    Kwon, W.5    Park, H.6
  • 15
    • 33748351402 scopus 로고    scopus 로고
    • Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution and routing adaptation
    • Westhoff, D., Girao, J., & Acharya, M. (2006).Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution and routing adaptation. In Proceedings of IEEE transactions on mobile computing (pp. 1417-1431).
    • (2006) Proceedings of IEEE Transactions on Mobile Computing , pp. 1417-1431
    • Westhoff, D.1    Girao, J.2    Acharya, M.3
  • 25
    • 34047147417 scopus 로고    scopus 로고
    • An efficient scheme for encrypted data aggregation on sensor networks
    • Li, T., Wu, Y., & Zhu, H. (2006). An efficient scheme for encrypted data aggregation on sensor networks. In Proceedings of vehicular technology conference (pp. 831-835).
    • (2006) Proceedings of Vehicular Technology Conference , pp. 831-835
    • Li, T.1    Wu, Y.2    Zhu, H.3
  • 27
    • 77954086232 scopus 로고    scopus 로고
    • SecureDAV: A secure data aggregation and verfication protocol for sensor networks
    • Mahimkar, A., & Rappaport, T. (2004). SecureDAV: A secure data aggregation and verfication protocol for sensor networks. In Proceedings of global communication.
    • (2004) Proceedings of Global Communication
    • Mahimkar, A.1    Rappaport, T.2
  • 32
  • 33
    • 85034837254 scopus 로고
    • Secret sharing homomorphisms: Keeping shares of a secret sharing
    • Benaloh, J. (1986). Secret sharing homomorphisms: Keeping shares of a secret sharing. In Advances in Cryptology-CRYPTO (pp. 251-260).
    • (1986) Advances in Cryptology-CRYPTO , pp. 251-260
    • Benaloh, J.1
  • 35
  • 40
    • 0002360237 scopus 로고
    • Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack
    • Rackoff, C., & Simon, D. (1991). Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Proceedings of advances in cryptology.
    • (1991) Proceedings of Advances in Cryptology
    • Rackoff, C.1    Simon, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.