메뉴 건너뛰기




Volumn 55, Issue 8, 2011, Pages 1735-1746

Integrity protecting hierarchical concealed data aggregation for wireless sensor networks

Author keywords

Concealed data aggregation; Data confidentiality; Data integrity; Wireless sensor networks

Indexed keywords

DATA AGGREGATION; DATA CONFIDENTIALITY; DATA INTEGRITY; DATA PACKET; ELLIPTIC CURVE; ENCRYPTION KEY; HIERARCHICAL DATA; HOMOMORPHIC-ENCRYPTIONS; SECURE DATA;

EID: 79955780885     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2011.01.006     Document Type: Article
Times cited : (114)

References (29)
  • 2
    • 11144340927 scopus 로고    scopus 로고
    • Designing secure sensor networks
    • DOI 10.1109/MWC.2004.1368895
    • E. Shi, and A. Perrig Designing secure sensor networks Wireless Communications Magazine 11 6 2004 38 43 (Pubitemid 40021188)
    • (2004) IEEE Wireless Communications , vol.11 , Issue.6 , pp. 38-43
    • Shi, E.1    Perrig, A.2
  • 3
    • 39649120580 scopus 로고    scopus 로고
    • The impact of data aggregation on the performance of wireless sensor networks
    • DOI 10.1002/wcm.454
    • K. Akkaya, M. Demirbas, and R.S. Aygun The impact of data aggregation on the performance of wireless sensor networks Wiley Wireless Communications and Mobile Computing (WCMC) Journal 8 2008 171 193 (Pubitemid 351286316)
    • (2008) Wireless Communications and Mobile Computing , vol.8 , Issue.2 , pp. 171-193
    • Akkaya, K.1    Demirbas, M.2    Aygun, R.S.3
  • 4
    • 67549118456 scopus 로고    scopus 로고
    • Secure data aggregation in wireless sensor networks: A comprehensive overview
    • S. Ozdemir, and Y. Xiao Secure data aggregation in wireless sensor networks: a comprehensive overview Computer Networks 53 12 2009 2022 2037
    • (2009) Computer Networks , vol.53 , Issue.12 , pp. 2022-2037
    • Ozdemir, S.1    Xiao, Y.2
  • 7
    • 32644435647 scopus 로고    scopus 로고
    • Energy-efficient secure pattern based data aggregation for wireless sensor networks
    • DOI 10.1016/j.comcom.2004.12.029, PII S0140366405000411
    • H. am, S. Ozdemir, P. Nair, D. Muthuavinashiappan, and H.O. Sanli Energy-efficient and secure pattern based data aggregation for wireless sensor networks Computer Communications 29 4 2006 446 455 (Pubitemid 43243228)
    • (2006) Computer Communications , vol.29 , Issue.4 , pp. 446-455
    • Cam, H.1    Ozdemir, S.2    Nair, P.3    Muthuavinashiappan, D.4    Ozgur Sanli, H.5
  • 8
    • 0842332407 scopus 로고    scopus 로고
    • A witness-based approach for data fusion assurance in wireless sensor networks
    • W. Du, J. Deng, Y.S. Han, P.K. Varshney, A witness-based approach for data fusion assurance in wireless sensor networks, in: Proceedings of GLOBECOM'03, 2003, pp. 1435-1439.
    • (2003) Proceedings of GLOBECOM'03 , pp. 1435-1439
    • Du, W.1    Deng, J.2    Han, Y.S.3    Varshney, P.K.4
  • 9
    • 33749986533 scopus 로고    scopus 로고
    • Secure data aggregation without persistent cryptographic operations in wireless sensor networks
    • DOI 10.1016/j.adhoc.2006.05.009, PII S1570870506000503, Security Issues in Sensor and Ad Hoc Networks
    • K. Wu, D. Dreef, B. Sun, and Y. Xiao Secure data aggregation without persistent cryptographic operations in wireless sensor networks Ad Hoc Networks 5 1 2007 100 111 (Pubitemid 44573008)
    • (2007) Ad Hoc Networks , vol.5 , Issue.1 , pp. 100-111
    • Wu, K.1    Dreef, D.2    Sun, B.3    Xiao, Y.4
  • 11
    • 54949103489 scopus 로고    scopus 로고
    • Functional reputation based reliable data aggregation and transmission for wireless sensor networks
    • S. Ozdemir Functional reputation based reliable data aggregation and transmission for wireless sensor networks Computer Communications 31 17 2008 3941 3953
    • (2008) Computer Communications , vol.31 , Issue.17 , pp. 3941-3953
    • Ozdemir, S.1
  • 12
    • 34548301953 scopus 로고    scopus 로고
    • PDA: Privacy-preserving data aggregation in wireless sensor networks
    • DOI 10.1109/INFCOM.2007.237, 4215819, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • W.B. He, X. Liu, H. Nguyen, K. Nahrstedt, T. Abdelzaher, PDA: privacy-preserving data aggregation in wireless sensor networks, in: Proceedings of IEEE INFOCOM, 2007, pp. 2045-2053. (Pubitemid 47334437)
    • (2007) Proceedings - IEEE INFOCOM , pp. 2045-2053
    • He, W.1    Liu, X.2    Nguyen, H.3    Nahrstedt, K.4    Abdelzaher, T.5
  • 13
    • 51349116601 scopus 로고    scopus 로고
    • Confidentiality protection for distributed sensor data aggregation
    • T. Feng, C. Wang, W. Zhang, L. Ruan, Confidentiality protection for distributed sensor data aggregation, in: Proceedings of IEEE INFOCOM, 2008, pp.56-60.
    • (2008) Proceedings of IEEE INFOCOM , pp. 56-60
    • Feng, T.1    Wang, C.2    Zhang, W.3    Ruan, L.4
  • 16
    • 77953308558 scopus 로고    scopus 로고
    • Prisense: Privacy-preserving data aggregation in people-centric urban sensing systems
    • J. Shi, R. Zhang, Y. Liu, Y. Zhang, Prisense: privacy-preserving data aggregation in people-centric urban sensing systems, in: Proceedings of IEEE INFOCOM, 2010, pp.1-9.
    • (2010) Proceedings of IEEE INFOCOM , pp. 1-9
    • Shi, J.1    Zhang, R.2    Liu, Y.3    Zhang, Y.4
  • 17
    • 33748351402 scopus 로고    scopus 로고
    • Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
    • DOI 10.1109/TMC.2006.144, 1683790
    • D. Westhoff, J. Girao, and M. Acharya Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution and routing adaptation IEEE Transactions on Mobile Computing 5 10 2006 1417 1431 (Pubitemid 44335247)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.10 , pp. 1417-1431
    • Westhoff, D.1    Girao, J.2    Acharya, M.3
  • 22
    • 79955747447 scopus 로고    scopus 로고
    • Crossbow Technologies Inc.
    • Crossbow Technologies Inc., .
  • 23
    • 32844459414 scopus 로고    scopus 로고
    • A key predistribution scheme for sensor networks using deployment knowledge
    • DOI 10.1109/TDSC.2006.2
    • W. Du, J. Deng, Y.S. Han, and P.K. Varshney A key predistribution scheme for sensor networks using deployment knowledge IEEE Transactions on Dependable and Secure Computing 03 1 2006 62 77 (Pubitemid 43254254)
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.1 , pp. 62-77
    • Du, W.1    Deng, J.2    Han, Y.S.3
  • 27
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Advances in Cryptology - CRYPTO '96
    • M. Bellare, R. Canetti, H. Krawczyk, Keying hash functions for message authentication, in: Crypto 1996, 1996, pp. 1-15. (Pubitemid 126106226)
    • (1996) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1109 , pp. 1-15
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 28
    • 79955756934 scopus 로고    scopus 로고
    • TinyOS Simulator
    • TinyOS Simulator, , 2010.
    • (2010)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.