메뉴 건너뛰기




Volumn 22, Issue 4, 2011, Pages 673-686

FDAC: Toward fine-grained distributed data access control in wireless sensor networks

Author keywords

attribute based encryption; Data access control; distributed storage; wireless sensor network

Indexed keywords

ATTRIBUTE-BASED ENCRYPTION; CRYPTOGRAPHIC PRIMITIVES; DATA ACCESS CONTROL; DATA SECURITY; DISTRIBUTED ARCHITECTURE; DISTRIBUTED DATA ACCESS; DISTRIBUTED SENSOR; DISTRIBUTED STORAGE; E-HEALTHCARE; FAULT-TOLERANT; ILLEGAL ACCESS; MISSION CRITICAL APPLICATIONS; RESOURCE-CONSTRAINED; SECURITY CHALLENGES; SECURITY REQUIREMENTS; SENSITIVE DATAS; SENSOR DATA; SENSOR PLATFORM;

EID: 79952071204     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2010.130     Document Type: Article
Times cited : (130)

References (52)
  • 1
    • 70349682512 scopus 로고    scopus 로고
    • FDAC: Toward fine-grained distributed data access control in wireless sensor networks
    • Apr.
    • S. Yu, K. Ren, and W. Lou, "FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks," Proc. IEEE INFOCOM, Apr. 2009.
    • (2009) Proc. IEEE INFOCOM
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 2
    • 5444275208 scopus 로고    scopus 로고
    • Wireless sensor and actor networks: Research challenges
    • Oct.
    • I.F. Akyildiz and I.H. Kasimoglu, "Wireless Sensor and Actor Networks: Research Challenges," Ad Hoc Networks, vol. 2, no. 4, pp. 351-367, Oct. 2004.
    • (2004) Ad Hoc Networks , vol.2 , Issue.4 , pp. 351-367
    • Akyildiz, I.F.1    Kasimoglu, I.H.2
  • 4
    • 2942686425 scopus 로고    scopus 로고
    • Sensor networks: Evolution, opportunities, and challenges
    • DOI 10.1109/JPROC.2003.814918, Sensor Networks and Applications
    • C.-Y. Chong and S.P. Kumar, "Sensor Networks: Evolution, Opportunities, and C (Pubitemid 40890834)
    • (2003) Proceedings of the IEEE , vol.91 , Issue.8 , pp. 1247-1256
    • Chong, C.-Y.1    Kumar, S.P.2
  • 6
    • 0002058575 scopus 로고    scopus 로고
    • Connecting the physical world with pervasive networks
    • DOI 10.1109/MPRV.2002.993145
    • D. Estrin, D. Culler, and K. Pister, "Connecting the Physical World with Pervasive Networks," IEEE Pervasive Computing, vol. 1, no. 1, pp. 59-69, Jan.-Mar. 2002. (Pubitemid 44939997)
    • (2002) IEEE Pervasive Computing , vol.1 , Issue.1 , pp. 59-69
    • Estrin, D.1    Culler, D.2    Pister, K.3    Sukhatme, G.4
  • 7
    • 85032779250 scopus 로고    scopus 로고
    • Secure sensor information management and mining
    • May
    • B. Thuraisingham, "Secure Sensor Information Management and Mining," IEEE Signal Processing Magazine, vol. 21, no. 3, pp. 14-19, May 2004.
    • (2004) IEEE Signal Processing Magazine , vol.21 , Issue.3 , pp. 14-19
    • Thuraisingham, B.1
  • 13
    • 18844435123 scopus 로고    scopus 로고
    • GEM:Graph embedding for routing and data-centric storage in sensor networks without geographic information
    • Nov.
    • J. Newsome and D. Song, "GEM:Graph Embedding for Routing and Data-Centric Storage in Sensor Networks without Geographic Information," Proc. ACM Conf. Embedded Networked Sensor Systems (SenSys '03), Nov. 2003.
    • (2003) Proc. ACM Conf. Embedded Networked Sensor Systems (SenSys '03)
    • Newsome, J.1    Song, D.2
  • 14
    • 34249316910 scopus 로고    scopus 로고
    • TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks
    • DOI 10.1016/j.adhoc.2006.05.004, PII S1570870506000321
    • J. Girao, D. Westhoff, E. Mykletun, and T. Araki, "Tinypeds: Tiny Persistent Encrypted Data Storage in Asynchronous Wireless Sensor Networks," Ad Hoc Networks, vol. 5, no. 7, pp. 1073-1089, 2007. (Pubitemid 46819205)
    • (2007) Ad Hoc Networks , vol.5 , Issue.7 , pp. 1073-1089
    • Girao, J.1    Westhoff, D.2    Mykletun, E.3    Araki, T.4
  • 16
    • 70349659577 scopus 로고    scopus 로고
    • Dependable and secure sensor data storage with dynamic integrity assurance
    • Apr.
    • Q. Wang, K. Ren, W. Lou, and Y. Zhang, "Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance," Proc. IEEE INFOCOM, Apr. 2009.
    • (2009) Proc. IEEE INFOCOM
    • Wang, Q.1    Ren, K.2    Lou, W.3    Zhang, Y.4
  • 18
    • 3543100577 scopus 로고    scopus 로고
    • Statistical en-route filtering of injected false data in sensor networks
    • Mar.
    • F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical En-Route Filtering of Injected False Data in Sensor Networks," Proc. IEEE INFOCOM, Mar. 2004.
    • (2004) Proc. IEEE INFOCOM
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 20
    • 67649494461 scopus 로고    scopus 로고
    • PDCS: Security and privacy support for data-centric sensor networks
    • Aug.
    • M. Shao, S. Zhu, W. Zhang, and G. Cao, "pDCS: Security and Privacy Support for Data-Centric Sensor Networks," IEEE Trans. Mobile Computing, vol. 8, no. 8, pp. 1023-1038, Aug. 2009.
    • (2009) IEEE Trans. Mobile Computing , vol.8 , Issue.8 , pp. 1023-1038
    • Shao, M.1    Zhu, S.2    Zhang, W.3    Cao, G.4
  • 21
    • 67650465277 scopus 로고    scopus 로고
    • Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks
    • R.D. Pietro, L. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Playing Hide-and-Seek with a Focused Mobile Adversary in Unattended Wireless Sensor Networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1463-1475, 2009.
    • (2009) Ad Hoc Networks , vol.7 , Issue.8 , pp. 1463-1475
    • Pietro, R.D.1    Mancini, L.2    Soriente, C.3    Spognardi, A.4    Tsudik, G.5
  • 22
    • 51849099823 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
    • Nov.
    • W. Zhang, H. Song, S. Zhu, and G. Cao, "Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks," ACM Trans. Sensor Networks, vol. 4, no. 4, Nov. 2008.
    • (2008) ACM Trans. Sensor Networks , vol.4 , Issue.4
    • Zhang, W.1    Song, H.2    Zhu, S.3    Cao, G.4
  • 26
    • 35648972648 scopus 로고    scopus 로고
    • Securing distributed data storage and retrieval in sensor networks
    • DOI 10.1016/j.pmcj.2007.06.002, PII S1574119207000454, PerCom 2007
    • N. Subramanian, C. Yang, and W. Zhang, "Securing Distributed Data Storage and Retrieval in Sensor Networks," Pervasive and Mobile Computing, (Special Issue for PerCom 2007), vol. 3, no. 6, pp. 659-676, Nov. 2007. (Pubitemid 350030640)
    • (2007) Pervasive and Mobile Computing , vol.3 , Issue.6 , pp. 659-676
    • Subramanian, N.1    Yang, C.2    Zhang, W.3
  • 32
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy perimeter stateless routing for wireless networks
    • Aug.
    • B. Karp and H. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," Proc. ACM Mobicom, Aug. 2000.
    • (2000) Proc. ACM Mobicom
    • Karp, B.1    Kung, H.2
  • 41
    • 24144459865 scopus 로고    scopus 로고
    • CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks
    • May
    • J. Girao, D. Westhoff, and M. Schneider, "CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks," Proc. IEEE Int'l Conf. Comm. (ICC '05), May 2005.
    • (2005) Proc. IEEE Int'l Conf. Comm. (ICC '05)
    • Girao, J.1    Westhoff, D.2    Schneider, M.3
  • 42
    • 76949090588 scopus 로고    scopus 로고
    • A survey on the encryption of convergecast-traffic with in-network processing
    • Jan.-Mar.
    • S. Peter, D. Westhoff, and C. Castelluccia, "A Survey on the Encryption of Convergecast-Traffic with In-Network Processing," IEEE Trans. Dependable and Secure Computing, vol. 7, no. 1, pp. 20- 34, Jan.-Mar. 2010.
    • (2010) IEEE Trans. Dependable and Secure Computing , vol.7 , Issue.1 , pp. 20-34
    • Peter, S.1    Westhoff, D.2    Castelluccia, C.3
  • 45
    • 36248933437 scopus 로고    scopus 로고
    • LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    • Apr.
    • K. Ren, W. Lou, and Y. Zhang, "LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks," Proc. IEEE INFOCOM, pp. 1-12, Apr. 2006.
    • (2006) Proc. IEEE INFOCOM , pp. 1-12
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 49
    • 79952070209 scopus 로고    scopus 로고
    • PBC Library
    • PBC Library, http://crypto.stanford.edu/pbc/times.html, 2010.
    • (2010)
  • 50
    • 79952068156 scopus 로고    scopus 로고
    • TinyECC Library
    • TinyECC Library, http://discovery.csc.ncsu.edu/software/ TinyECC/index.html, 2010.
    • (2010)
  • 52
    • 79952070559 scopus 로고    scopus 로고
    • TelosB mote platform
    • TelosB mote platform, http://www.xbow.com/Products/ Product-pdf-files/ Wireless-pdf/TelosB-Datasheet.pdf, 2009.
    • (2009)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.