메뉴 건너뛰기




Volumn 17, Issue 5, 2011, Pages 1235-1249

Fine-grained data access control for distributed sensor networks

Author keywords

Access control; Attribute based encryption; Distributed sensor networks; Revocation

Indexed keywords

ACCESS CONTROL SCHEMES; ACCESS POLICIES; ANALYSIS RESULTS; ATTRIBUTE-BASED ENCRYPTION; COMPUTATION OVERHEADS; DATA ACCESS CONTROL; DISTRIBUTED SENSOR NETWORKS; GROUP KEY DISTRIBUTION; PROXY ENCRYPTIONS; PUBLIC KEY CRYPTOSYSTEMS; REVOCATION; ROBUST SOLUTIONS; SECURITY POLICY; SECURITY REQUIREMENTS; SENSITIVE SENSORS; SENSOR DATA; SENSOR DEVICE; SENSOR SYSTEMS; USER ACCESS CONTROL; USER REVOCATION;

EID: 79959506807     PISSN: 10220038     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11276-011-0345-8     Document Type: Article
Times cited : (17)

References (31)
  • 1
    • 5444275208 scopus 로고    scopus 로고
    • Wireless sensor and actor networks: Research challenges
    • 10.1016/j.adhoc.2004.04.003
    • I. F. Akyildiz I. H. Kasimoglu 2004 Wireless sensor and actor networks: Research challenges Ad Hoc Networks Journal 2 4 351 367 10.1016/j.adhoc.2004.04. 003
    • (2004) Ad Hoc Networks Journal , vol.2 , Issue.4 , pp. 351-367
    • Akyildiz, I.F.1    Kasimoglu, I.H.2
  • 2
    • 85032779250 scopus 로고    scopus 로고
    • Secure sensor information management and mining
    • 10.1109/MSP.2004.1296538
    • B. Thuraisingham 2004 Secure sensor information management and mining IEEE Signal Processing Magazine 21 3 14 19 10.1109/MSP.2004.1296538
    • (2004) IEEE Signal Processing Magazine , vol.21 , Issue.3 , pp. 14-19
    • Thuraisingham, B.1
  • 3
    • 70349682512 scopus 로고    scopus 로고
    • FDAC: Toward fine-grained distributed data access control in wireless sensor networks
    • Yu, S.; Ren, K.; & Lou, W. (2009). FDAC: Toward fine-grained distributed data access control in wireless sensor networks. In Proceeding IEEE INFOCOM, pp. 963-971.
    • (2009) Proceeding IEEE INFOCOM , pp. 963-971
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 4
    • 0036949025 scopus 로고    scopus 로고
    • A two-tier data dissemination model for large-scale wireless sensor networks
    • Ye, F.; Luo, H.; Cheng, H.; Lu, S.; & Zhang, L. (2002). A two-tier data dissemination model for large-scale wireless sensor networks. In Proceeding ACM Mobicom, pp. 148-159.
    • (2002) Proceeding ACM Mobicom , pp. 148-159
    • Ye, F.1    Luo, H.2    Cheng, H.3    Lu, S.4    Zhang, L.5
  • 5
    • 14844295998 scopus 로고    scopus 로고
    • SIA: Secure information aggregation in sensor networks
    • Przydatek, B.; Song, D.; & Perrig, A. (2003). SIA: Secure information aggregation in sensor networks. In Proceeding Sensys.
    • (2003) Proceeding Sensys
    • Przydatek, B.1    Song, D.2    Perrig, A.3
  • 8
    • 34547487841 scopus 로고    scopus 로고
    • Capsule: An energy-optimized object storage system for memory-constrained sensor devices
    • Mathur, G.; Desnoyers, P.; Ganesan, D.; & Shenoy, P. (2006). Capsule: An energy-optimized object storage system for memory-constrained sensor devices. In Proceeding ACM Sensys.
    • (2006) Proceeding ACM Sensys
    • Mathur, G.1    Desnoyers, P.2    Ganesan, D.3    Shenoy, P.4
  • 10
    • 35648972648 scopus 로고    scopus 로고
    • Securing distributed data storage and retrieval in sensor networks
    • Subramanian, N.; Yang, C.; & Zhang, W. (2007). Securing distributed data storage and retrieval in sensor networks. In Proceeding PerCom.
    • (2007) Proceeding PerCom
    • Subramanian, N.1    Yang, C.2    Zhang, W.3
  • 11
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • Sahai, A.; & Waters, B. (2005). Fuzzy identity-based encryption. In Proceeding Eurocrypt, pp. 457-473. (Pubitemid 41313969)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 12
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • DOI 10.1145/1180405.1180418, 1180418, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • Goyal, V.; Pandey, O.; Sahai, A.; & Waters, B. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceeding ACM conference on computer and communications security, pp. 89-98. (Pubitemid 47131359)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 13
    • 34548731375 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption
    • DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
    • Bethencourt, J.; Sahai, A.; & Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Proceeding IEEE symposium on security and privacy, pp. 321-334. (Pubitemid 47432538)
    • (2007) Proceedings - IEEE Symposium on Security and Privacy , pp. 321-334
    • Bethencourt, J.1    Sahai, A.2    Waters, B.3
  • 17
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • 10.1145/937503.937506
    • S. Rafaeli D. Hutchison 2003 A survey of key management for secure group communication ACM Computing Surveys 35 3 309 329 10.1145/937503.937506
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 19
    • 79957599737 scopus 로고    scopus 로고
    • Ciphertext policy attribute based encryption with efficient revocation
    • University of Waterloo. AccessedMarch2010
    • Liang, X.; Lu, R.; Lin, X.; & Shen, X. (2010). Ciphertext policy attribute based encryption with efficient revocation. Technical Report. University of Waterloo. http://bbcr.uwaterloo.ca/~x27liang/papers/ abe%20with%20revocation.pdf. Accessed March 2010.
    • (2010) Technical Report
    • Liang, X.1    Lu, R.2    Lin, X.3    Shen, X.4
  • 20
    • 76649143738 scopus 로고    scopus 로고
    • Mediated ciphertext-policy attribute-based encryption and its application
    • Ibraimi, L.; Petkovic, M.; Nikova, S.; Hartel, P.; & Jonker, W. (2009). Mediated ciphertext-policy attribute-based encryption and its application. In Proceeding WISA, LNCS, vol. 5932, pp. 309-323.
    • (2009) Proceeding WISA, LNCS , vol.5932 , pp. 309-323
    • Ibraimi, L.1    Petkovic, M.2    Nikova, S.3    Hartel, P.4    Jonker, W.5
  • 21
    • 77954471010 scopus 로고    scopus 로고
    • Attribute based data sharing with attribute revocation
    • Yu, S.; Wang, C.; Ren, K.; & Lou, W. (2010). Attribute based data sharing with attribute revocation. In Proceeding ASIACCS.
    • (2010) Proceeding ASIACCS
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 23
    • 0030609312 scopus 로고    scopus 로고
    • Iolus: A framework for scalable secure multicasting
    • Mittra, S. (1997) Iolus: A framework for scalable secure multicasting. In Proceeding ACM SIGCOMM, pp. 277-288. (Pubitemid 127568367)
    • (1997) Computer Communication Review , vol.27 , Issue.4 , pp. 277-288
    • Mittra, S.1
  • 24
    • 0034318740 scopus 로고    scopus 로고
    • Scalable secure one-to-many group communication using dual encryption
    • DOI 10.1016/S0140-3664(00)00255-3
    • L. Dondeti S. Mukherjee A. Samal 1999 Scalable secure one-to-many group communication using dual encryption Computer Communication 23 1681 1701 10.1016/S0140-3664(00)00255-3 (Pubitemid 32033569)
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1681-1701
    • Dondeti, L.R.1    Mukherjee, S.2    Samal, A.3
  • 25
    • 84880852861 scopus 로고    scopus 로고
    • Revocation and Tracing Schemes for Stateless Receivers
    • Advances in Cryptology - CRYPTO 2001
    • Naor, D.; Naor, M.; & Lotspiech, J. (2001). Revocation and tracing schemes for stateless receivers. In Proceeding CRYPTO, LNCS, vol. 2139, pp. 41-62. (Pubitemid 33317907)
    • (2001) Lecture Notes in Computer Science , Issue.2139 , pp. 41-62
    • Naor, D.1    Naor, M.2    Lotspiech, J.3
  • 26
    • 0242341057 scopus 로고    scopus 로고
    • Multicast group behavior in the internet's multicast backbone (MBone)
    • K. C. Almeroth M. H. Ammar 1997 Multicast group behavior in the Internet's multicast backbone (MBone) IEEE Communication Magazine 35 124 129 10.1109/35.587716 (Pubitemid 127648436)
    • (1997) IEEE Communications Magazine , vol.35 , Issue.6 , pp. 124-129
    • Almeroth, K.C.1    Ammar, M.H.2
  • 28
    • 77955015028 scopus 로고    scopus 로고
    • TinyPairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks
    • Xiong, X.; Wong, d. S.; & Deng. X. (2010). TinyPairing: A fast and lightweight pairing-based cryptographic library for wireless sensor networks. In Proceeding IEEE WCNC 2010.
    • (2010) Proceeding IEEE WCNC 2010
    • Xiong, X.1    Wong, D.S.2    Deng, X.3
  • 29
    • 78751642743 scopus 로고    scopus 로고
    • TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
    • 10.1016/j.comcom.2010.05.013
    • L. B. Oliveira D. F. Aranha C. P. L. Gouvea M. Scott D. F. Camara J. Lopez R. Dahab 2011 TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks Computer Communications 34 485 493 10.1016/j.comcom.2010.05.013
    • (2011) Computer Communications , vol.34 , pp. 485-493
    • Oliveira, L.B.1    Aranha, D.F.2    Gouvea, C.P.L.3    Scott, M.4    Camara, D.F.5    Lopez, J.6    Dahab, R.7
  • 30
    • 84983187647 scopus 로고    scopus 로고
    • AccessedJune2010
    • TinyECC Library. http://discovery.csc.ncsu.edu/software/TinyECC/index. html. Accessed June 2010.
    • TinyECC Library
  • 31
    • 0036738266 scopus 로고    scopus 로고
    • SPINS: Security protocols for sensor networks
    • 1030.68814 10.1023/A:1016598314198
    • A. Perrig R. Szewczyk V. Wen D. Culler J.D. Tygar 2002 SPINS: Security protocols for sensor networks Wireless Networks 8 521 534 1030.68814 10.1023/A:1016598314198
    • (2002) Wireless Networks , vol.8 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Wen, V.3    Culler, D.4    Tygar, J.D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.