메뉴 건너뛰기




Volumn 6, Issue 2, 2011, Pages 241-255

Practical and secure multidimensional query framework in tiered sensor networks

Author keywords

Multidimensional query; secure query; sensor network

Indexed keywords

COMPROMISED NODES; DATA COLLECTION; DATA CONFIDENTIALITY; EXTENSIVE SIMULATIONS; LARGE SCALE SENSOR NETWORK; MANAGEMENT COMPLEXITY; MULTI-DIMENSIONAL QUERIES; NETWORK CAPACITY; NODE COMPROMISE; OTHER APPLICATIONS; PROTOTYPE IMPLEMENTATIONS; QUERY RESULTS; RANGE QUERY; RESOURCE EFFICIENCIES; SAMPLING TECHNIQUE; SECURE QUERY; SECURITY BREACHES; SKYLINE QUERY; STORAGE NODES; SUBTREES; TREE-BASED; TWO-TIER ARCHITECTURE;

EID: 79957487965     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2011.2109384     Document Type: Article
Times cited : (33)

References (33)
  • 1
    • 0242696202 scopus 로고    scopus 로고
    • On the minimum node degree and connectivity of a wireless multihop network
    • Lausanne, Switzerland
    • C. Bettstetter, "On the minimum node degree and connectivity of a wireless multihop network," in Proc. ACM MobiHoc, Lausanne, Switzerland, 2002.
    • (2002) Proc. ACM MobiHoc
    • Bettstetter, C.1
  • 2
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: Peer intermediaries for key establishment in sensor networks
    • Miami, FL
    • H. Chan and A. Perrig, "PIKE: Peer intermediaries for key establishment in sensor networks," in Proc. IEEE INFOCOM,Miami, FL, 2005.
    • (2005) Proc. IEEE INFOCOM
    • Chan, H.1    Perrig, A.2
  • 3
    • 70349270769 scopus 로고    scopus 로고
    • Efficient security primitives from a secure aggregation algorithm
    • Alexandria, VA
    • H. Chan and A. Perrig, "Efficient security primitives from a secure aggregation algorithm," in Proc. ACM CCS, Alexandria, VA, 2008.
    • (2008) Proc. ACM CCS
    • Chan, H.1    Perrig, A.2
  • 4
    • 33845747795 scopus 로고    scopus 로고
    • Secure hierarchical in-network aggregation in sensor networks
    • Alexandria, VA
    • H. Chan, A. Perrig, and D. Song, "Secure hierarchical in-network aggregation in sensor networks," in Proc. ACM CCS, Alexandria, VA, 2006.
    • (2006) Proc. ACM CCS
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 5
    • 70349262713 scopus 로고    scopus 로고
    • Towards energy-efficient skylinemonitoring in wireless sensor networks
    • Delft, The Netherlands
    • H. Chen, S. Zhou, and J. Guan, "Towards energy-efficient skylinemonitoring in wireless sensor networks," in Proc. EWSN, Delft, The Netherlands, 2007.
    • (2007) Proc. EWSN
    • Chen, H.1    Zhou, S.2    Guan, J.3
  • 6
    • 85092638639 scopus 로고    scopus 로고
    • PRESTO: A predictive storage architecture for sensor networks
    • Santa Fe, NM
    • P. Desnoyers, D. Ganesan, H. Li, M. Li, and P. Shenoy, "PRESTO: A predictive storage architecture for sensor networks," in Proc. HotOS, Santa Fe, NM, 2005.
    • (2005) Proc. HotOS
    • Desnoyers, P.1    Ganesan, D.2    Li, H.3    Li, M.4    Shenoy, P.5
  • 7
    • 0036361105 scopus 로고    scopus 로고
    • Executing SQL over encrypted data in the database service provider model
    • Madison, WI
    • H. Hacigumus, B. R. Iyer, C. Li, and S. Mehrotra, "Executing SQL over encrypted data in the database service provider model," in Proc. ACM SIGMOD, Madison, WI, 2002.
    • (2002) Proc. ACM SIGMOD
    • Hacigumus, H.1    Iyer, B.R.2    Li, C.3    Mehrotra, S.4
  • 8
    • 85065578926 scopus 로고    scopus 로고
    • A privacy-preserving index for range queries
    • Toronto, Canada
    • B. Hore, S. Mehrotra, and G. Tsudik, "A privacy-preserving index for range queries," in Proc. VLDB, Toronto, Canada, 2004.
    • (2004) Proc. VLDB
    • Hore, B.1    Mehrotra, S.2    Tsudik, G.3
  • 9
    • 56749170948 scopus 로고    scopus 로고
    • Defending against false-endorsement-based DoS attacks in wireless sensor networks
    • Alexandria, VA
    • C. Krauß, M. Schneider, and C. Eckert, "Defending against false-endorsement- based DoS attacks in wireless sensor networks," in Proc. ACM WiSec, Alexandria, VA, 2008.
    • (2008) Proc. ACM WiSec
    • Krauß, C.1    Schneider, M.2    Eckert, C.3
  • 10
    • 79957441514 scopus 로고    scopus 로고
    • Energy-efficient skyline query processing and maintenance in sensor networks
    • Napa Valley, CA
    • W. Liang, B. Chen, and J. Yu, "Energy-efficient skyline query processing and maintenance in sensor networks," in Proc. ACM CIKM, Napa Valley, CA, 2008.
    • (2008) Proc. ACM CIKM
    • Liang, W.1    Chen, B.2    Yu, J.3
  • 11
    • 20344371174 scopus 로고    scopus 로고
    • Multi-dimensional range queries in sensor networks
    • Los Angeles, CA
    • X. Li, Y. Kim, R. Govindan, and W. Hong, "Multi-dimensional range queries in sensor networks," in Proc. ACM SenSys, Los Angeles, CA, 2003.
    • (2003) Proc. ACM SenSys
    • Li, X.1    Kim, Y.2    Govindan, R.3    Hong, W.4
  • 12
    • 79953769032 scopus 로고    scopus 로고
    • Using the power of two choics to improve bloom filters
    • S. Lumetta and M. Mitzenmacher, "Using the power of two choics to improve bloom filters," Internet Math., vol. 4, no. 1, pp. 17-33, 2009.
    • (2009) Internet Math , vol.4 , Issue.1 , pp. 17-33
    • Lumetta, S.1    Mitzenmacher, M.2
  • 13
    • 85000276942 scopus 로고    scopus 로고
    • Multi-level TESLA: Broadcast authentication for distributed sensor networks
    • D. Liu and P. Ning, "Multi-level TESLA: Broadcast authentication for distributed sensor networks," ACM Trans. Embedded Comput. Syst. (TECS), vol. 3, no. 4, pp. 800-836, 2004.
    • (2004) ACM Trans. Embedded Comput. Syst. (TECS) , vol.3 , Issue.4 , pp. 800-836
    • Liu, D.1    Ning, P.2
  • 16
    • 23944487783 scopus 로고    scopus 로고
    • TinyDB: An acquisitional query processing system for sensor networks
    • DOI 10.1145/1061318.1061322
    • S. R. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, "TinyDB: An acquisitional query processing system for sensor networks," ACM Trans. Database Syst., vol. 30, no. 1, pp. 122-173, Mar. 2005. (Pubitemid 41201813)
    • (2005) ACM Transactions on Database Systems , vol.30 , Issue.1 , pp. 122-173
    • Madden, S.R.1    Franklin, M.J.2    Hellerstein, J.M.3    Hong, W.4
  • 17
    • 11244326497 scopus 로고    scopus 로고
    • The Sybil attack in sensor networks: Analysis and defenses
    • Berkeley, CA
    • J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: Analysis and defenses," in Proc. IPSN, Berkeley, CA, 2004.
    • (2004) Proc. IPSN
    • Newsome, J.1    Shi, E.2    Song, D.3    Perrig, A.4
  • 18
    • 26444532494 scopus 로고    scopus 로고
    • OCB: A block-cipher mode of operation for efficient authenticated encryption
    • P. Rogaway, M. Bellare, and J. Black, "OCB: A block-cipher mode of operation for efficient authenticated encryption," ACM Trans. Inf. Syst. Security, vol. 6, no. 3, pp. 365-403, 2003.
    • (2003) ACM Trans. Inf. Syst. Security , vol.6 , Issue.3 , pp. 365-403
    • Rogaway, P.1    Bellare, M.2    Black, J.3
  • 19
    • 79957465063 scopus 로고    scopus 로고
    • RISE Project [Online]. Available
    • RISE Project [Online]. Available: http://www.cs.ucr.edu/̃rise
  • 21
    • 51349098378 scopus 로고    scopus 로고
    • Verifiable privacy-preserving range query in twotiered sensor networks
    • Phoenix, AZ
    • B. Sheng and Q. Li, "Verifiable privacy-preserving range query in twotiered sensor networks," in Proc. IEEE INFOCOM, Phoenix,AZ, 2008.
    • (2008) Proc. IEEE INFOCOM
    • Sheng, B.1    Li, Q.2
  • 23
    • 34347249729 scopus 로고    scopus 로고
    • Remote softwarebased Attestation for wireless sensors
    • Visegrad, Hungary
    • M. Shaneck, K. Mahadevan, V. Kher, and Y. Kim, "Remote softwarebased Attestation for wireless sensors," in Proc. ESAS, Visegrad, Hungary, 2005.
    • (2005) Proc. ESAS
    • Shaneck, M.1    Mahadevan, K.2    Kher, V.3    Kim, Y.4
  • 24
    • 34547282118 scopus 로고    scopus 로고
    • TinySeRSync: Secure and resilient time synchronization in wireless sensor networks
    • Alexandria, VA
    • K. Sun, P. Ning, C. Wang, A. Liu, and Y. Zhou, "TinySeRSync: Secure and resilient time synchronization in wireless sensor networks," in Proc. ACM CCS, Alexandria, VA, 2006.
    • (2006) Proc. ACM CCS
    • Sun, K.1    Ning, P.2    Wang, C.3    Liu, A.4    Zhou, Y.5
  • 25
    • 3042738543 scopus 로고    scopus 로고
    • SWATT: Soft-Ware-based attestation for embedded devices
    • Berkeley, CA
    • A. Seshadri, A. Perrig, L. V. Doorn, and P. Khosla, "SWATT: Soft- Ware-based attestation for embedded devices," in Proc. IEEE S&P, Berkeley, CA, 2004.
    • (2004) Proc. IEEE S&P
    • Seshadri, A.1    Perrig, A.2    Doorn, L.V.3    Khosla, P.4
  • 26
    • 79957511514 scopus 로고    scopus 로고
    • Stargate Gateway (SPB400) [Online]. Available
    • Stargate Gateway (SPB400) [Online]. Available: http://www. xbow.com
  • 28
    • 70349690087 scopus 로고    scopus 로고
    • Secure range queries in tiered sensor networks
    • Rio de Janeiro, Brazil
    • J. Shi, R. Zhang, and Y. Zhang, "Secure range queries in tiered sensor networks," in Proc. IEEE INFOCOM, Rio de Janeiro, Brazil, 2009.
    • (2009) Proc. IEEE INFOCOM
    • Shi, J.1    Zhang, R.2    Zhang, Y.3
  • 30
    • 77955667914 scopus 로고    scopus 로고
    • Non-interactive pairwise key establishment for sensor networks
    • Sep.
    • C.-M. Yu, C.-S. Lu, and S.-Y. Kuo, "Non-interactive pairwise key establishment for sensor networks," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 556-569, Sep. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.3 , pp. 556-569
    • Yu, C.-M.1    Lu, C.-S.2    Kuo, S.-Y.3
  • 32
    • 77953304573 scopus 로고    scopus 로고
    • Verifiable top-k queries in tiered sensor networks
    • San Diego, CA
    • R. Zhang, J. Shi, Y. Liu, and Y. Zhang, "Verifiable top-k queries in tiered sensor networks," in Proc. IEEE INFOCOM, San Diego, CA, 2010.
    • Proc. IEEE INFOCOM , vol.2010
    • Zhang, R.1    Shi, J.2    Liu, Y.3    Zhang, Y.4
  • 33
    • 70450207961 scopus 로고    scopus 로고
    • Secure multidimensional range queries in sensor networks
    • New Orleans, LA
    • R. Zhang, J. Shi, and Y. Zhang, "Secure multidimensional range queries in sensor networks," in Proc. ACM MobiHoc, New Orleans, LA, 2009.
    • (2009) Proc. ACM MobiHoc
    • Zhang, R.1    Shi, J.2    Zhang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.