메뉴 건너뛰기




Volumn 4, Issue 11, 2009, Pages 894-901

Network coding based dependable and efficient data survival in unattended wireless sensor networks

Author keywords

Data Survival; Distributed Storage; Network Coding; Security; Wireless Sensor Networks

Indexed keywords

COMMUNICATION EFFICIENCY; DATA RETRIEVAL; DATA STORAGE; DATA SURVIVAL; DISTRIBUTED STORAGE; HISTORICAL INFORMATION; LONG TERM; NETWORK CODING; NODE COMPROMISE; RANDOM FAILURES; REAL-TIME DATA; RESEARCH COMMUNITIES; SECRET SHARING;

EID: 77958110931     PISSN: 17962021     EISSN: None     Source Type: Journal    
DOI: 10.4304/jcm.4.11.894-901     Document Type: Article
Times cited : (10)

References (35)
  • 2
    • 35348912495 scopus 로고    scopus 로고
    • Underground structure monitoring with wireless sensor networks
    • April
    • M. Li and Y. Liu, "Underground structure monitoring with wireless sensor networks," in Proc. 2007 IEEE IPSN (IPSN'07), April 2007.
    • (2007) Proc. 2007 IEEE IPSN (IPSN'07)
    • Li, M.1    Liu, Y.2
  • 6
    • 34249316910 scopus 로고    scopus 로고
    • Tinypeds: Tiny persistent encrypted data storage in asyn-chronous wireless sensor networks
    • September
    • J. Girao, D. Westhoff, E. Mykletun, and T. Araki, "Tinypeds: Tiny persistent encrypted data storage in asyn-chronous wireless sensor networks," Ad Hoc Networks, Elsevier, vol. 5, no. 7, pp. 1073-1089, September 2007.
    • (2007) Ad Hoc Networks, Elsevier , vol.5 , Issue.7 , pp. 1073-1089
    • Girao, J.1    Westhoff, D.2    Mykletun, E.3    Araki, T.4
  • 8
    • 78651542331 scopus 로고    scopus 로고
    • A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing
    • Elsevier, In Press, Corrected Proof, Available online, October
    • F. Armknecht, D. Westhoff, J. Girao, and A. Hessler, "A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing," Computer Communications, Elsevier, In Press, Corrected Proof, Available online, October 2007.
    • (2007) Computer Communications
    • Armknecht, F.1    Westhoff, D.2    Girao, J.3    Hessler, A.4
  • 9
    • 0042564491 scopus 로고    scopus 로고
    • Data-centric storage in sensornets with GHT, a geographic hash table
    • S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu, "Data-centric storage in sensornets with GHT, a geographic hash table," Mob. Netw. Appl., vol. 8, no. 4, pp. 427-442, 2003.
    • (2003) Mob. Netw. Appl , vol.8 , Issue.4 , pp. 427-442
    • Ratnasamy, S.1    Karp, B.2    Shenker, S.3    Estrin, D.4    Govindan, R.5    Yin, L.6    Yu, F.7
  • 11
    • 35348838502 scopus 로고    scopus 로고
    • Flashdb: Dynamic self-tuning database for nand flash
    • April
    • S. Nath and A. Kansai, "Flashdb: Dynamic self-tuning database for nand flash," in Proc. of IPSN07, April 2007.
    • (2007) Proc. of IPSN07
    • Nath, S.1    Kansai, A.2
  • 14
    • 34548392902 scopus 로고    scopus 로고
    • The de-sign and implementation of a self-calibrating distributed acoustic sensing platform
    • L. Girod, M. Lukac, V. Trifa, and D. Estrin, "The de-sign and implementation of a self-calibrating distributed acoustic sensing platform," in Proc. of ACM SenSys (2006), 2006.
    • (2006) Proc. of ACM SenSys (2006)
    • Girod, L.1    Lukac, M.2    Trifa, V.3    Estrin, D.4
  • 15
    • 33744945778 scopus 로고    scopus 로고
    • Xyz: A motion-enabled, power aware sensor node platform for distributed sensor network applications
    • April
    • D. Lymberopoulos and A. Savvides, "Xyz: A motion-enabled, power aware sensor node platform for distributed sensor network applications," in Proc. of IPSN SPOTS 2005, April 2005.
    • (2005) Proc. of IPSN SPOTS 2005
    • Lymberopoulos, D.1    Savvides, A.2
  • 17
    • 0002152839 scopus 로고
    • How to withsand mobile virus attacks
    • R. Osrovsky and M. Yung, "How to withsand mobile virus attacks," in Proc. of PODC, 1991, pp. 51-59.
    • (1991) Proc. of PODC , pp. 51-59
    • Osrovsky, R.1    Yung, M.2
  • 19
    • 4243082091 scopus 로고    scopus 로고
    • Secrity in wireless sensor networks
    • A. Perrig, J.A. Stankovic, and D. Wagner, "Secrity in wireless sensor networks," Communicaion of ACM, vol. 47, no. 6, pp. 53-57, 2004.
    • (2004) Communicaion of ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.A.2    Wagner, D.3
  • 25
    • 63149146072 scopus 로고    scopus 로고
    • Fast galois field arithmetic library in c/c++
    • J. S. Plank, "Fast galois field arithmetic library in c/c++," Tech. Report UT-CS-07-593, 2007.
    • (2007) Tech. Report UT-CS-07-593
    • Plank, J.S.1
  • 27
    • 1542300188 scopus 로고    scopus 로고
    • Dependable and secure data storage and retrieval in mobile, wireless networks
    • S. Chessa and P. Maestrini, "Dependable and secure data storage and retrieval in mobile, wireless networks," in Proc. of DSN'03.
    • Proc. of DSN'03
    • Chessa, S.1    Maestrini, P.2
  • 28
    • 35048880121 scopus 로고    scopus 로고
    • Dependable and secure data storage in wireless ad hoc networks: An assessment of ds2
    • S. Chessa, R. D. Pietro, and P. Maestrini, "Dependable and secure data storage in wireless ad hoc networks: An assessment of ds2," in Proc. of WONS 2004, 2004, pp. 184-198.
    • (2004) Proc. of WONS 2004 , pp. 184-198
    • Chessa, S.1    Pietro, R.D.2    Maestrini, P.3
  • 31
    • 5044242517 scopus 로고    scopus 로고
    • Byzantine modification detection in multicast networks using randomized network coding
    • T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. Karger, "Byzantine modification detection in multicast networks using randomized network coding," in Proc. of ISIT'04, 2004.
    • (2004) Proc. of ISIT'04
    • Ho, T.1    Leong, B.2    Koetter, R.3    Medard, M.4    Effros, M.5    Karger, D.6
  • 33
    • 78651575647 scopus 로고    scopus 로고
    • Secure network coding wiht a cost criterion
    • J. Tan and M. Medard, "Secure network coding wiht a cost criterion," in Proc. of WiOpt'06, 2006.
    • (2006) Proc. of WiOpt'06
    • Tan, J.1    Medard, M.2
  • 34
  • 35
    • 70349664122 scopus 로고    scopus 로고
    • An efficient signature-based scheme for securing network coding against pullution attacks
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signature-based scheme for securing network coding against pullution attacks," in Proc. of INFOCOM08, 2008.
    • (2008) Proc. of INFOCOM08
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.