메뉴 건너뛰기




Volumn 30, Issue 2, 2012, Pages 433-441

Secure cooperative data storage and query processing in unattended tiered sensor networks

Author keywords

cooperative data storage and query processing; range query; security; Unattended tiered sensor networks

Indexed keywords

DATA CONFIDENTIALITY; DATA STORAGE; HIGH EFFICACY; HIGH PROBABILITY; HOSTILE ENVIRONMENTS; MULTI-DIMENSIONAL RANGE QUERIES; PERFORMANCE EVALUATION; QUERY RESULTS; RANGE QUERY; RESOURCE-RICH; SECURITY; SENSITIVE DATAS; TEMPORAL RELATIONSHIPS;

EID: 84863078189     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2012.120223     Document Type: Article
Times cited : (14)

References (25)
  • 1
    • 84863052671 scopus 로고    scopus 로고
    • Secure multidimensional range queries in sensor networks
    • New Orleans, LA, May
    • R. Zhang, J. Shi, and Y. Zhang, "Secure multidimensional range queries in sensor networks," in ACM MobiHoc'09, New Orleans, LA, May 2009.
    • (2009) ACM MobiHoc'09
    • Zhang, R.1    Shi, J.2    Zhang, Y.3
  • 2
    • 49149089237 scopus 로고    scopus 로고
    • Catch me (if you can): Data survival in unattended sensor networks
    • Hong Kong, China, Mar.
    • R. D. Pietro, L. V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, "Catch me (if you can): Data survival in unattended sensor networks," in PerCom'08, Hong Kong, China, Mar. 2008, pp. 185-194.
    • (2008) PerCom'08 , pp. 185-194
    • Pietro, R.D.1    Mancini, L.V.2    Soriente, C.3    Spognardi, A.4    Tsudik, G.5
  • 3
    • 65249138169 scopus 로고    scopus 로고
    • New adversary and new threats: Security in unattended sensor networks
    • D. Ma, C. Soriente, and G. Tsudik, "New adversary and new threats: security in unattended sensor networks," IEEE Network, vol. 23, no. 2, pp. 43-48, 2009.
    • (2009) IEEE Network , vol.23 , Issue.2 , pp. 43-48
    • Ma, D.1    Soriente, C.2    Tsudik, G.3
  • 4
    • 84905852894 scopus 로고    scopus 로고
    • TSAR: A two tier sensor storage architecture using interval skip graphs
    • San Diego, California, USA, Nov.
    • P. Desnoyers, D. Ganesan, and P. Shenoy, "TSAR: A two tier sensor storage architecture using interval skip graphs," in ACM SenSys'05, San Diego, California, USA, Nov. 2005, pp. 39-50.
    • (2005) ACM SenSys'05 , pp. 39-50
    • Desnoyers, P.1    Ganesan, D.2    Shenoy, P.3
  • 5
    • 74249122684 scopus 로고    scopus 로고
    • Data storage placement in sensor networks
    • Florence, Italy, May
    • B. Sheng, Q. Li, and W. Mao, "Data storage placement in sensor networks," in ACM MobiHoc'06, Florence, Italy, May 2006.
    • (2006) ACM MobiHoc'06
    • Sheng, B.1    Li, Q.2    Mao, W.3
  • 6
    • 34548302064 scopus 로고    scopus 로고
    • PDCS: Security and privacy support for data-centric sensor networks
    • DOI 10.1109/INFCOM.2007.154, 4215736, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • M. Shao, S. Zhu, W. Zhang, and G. Cao, "pDCS: Security and privacy support for data-centric sensor networks," in IEEE INFOCOM'07, Anchorage, Alaska, USA, May 2007, pp. 1298-1306. (Pubitemid 47334354)
    • (2007) Proceedings - IEEE INFOCOM , pp. 1298-1306
    • Shao, M.1    Zhu, S.2    Zhang, W.3    Cao, G.4
  • 7
    • 70349652889 scopus 로고    scopus 로고
    • Verifiable privacy-preserving range query in sensor networks
    • Phoenix, AZ, Apr.
    • B. Sheng and Q. Li, "Verifiable privacy-preserving range query in sensor networks," in IEEE INFOCOM'08, Phoenix, AZ, Apr. 2008, pp. 46-50.
    • (2008) IEEE INFOCOM'08 , pp. 46-50
    • Sheng, B.1    Li, Q.2
  • 10
    • 23944487783 scopus 로고    scopus 로고
    • TinyDB: An acquisitional query processing system for sensor networks
    • DOI 10.1145/1061318.1061322
    • S. R. Madden, M. J. Franklin, J. M. Hellerstein, and W. Hong, "TinyDB: an acquisitional query processing system for sensor networks," ACM Trans. Database Syst., vol. 30, no. 1, pp. 122-173, Mar. 2005. (Pubitemid 41201813)
    • (2005) ACM Transactions on Database Systems , vol.30 , Issue.1 , pp. 122-173
    • Madden, S.R.1    Franklin, M.J.2    Hellerstein, J.M.3    Hong, W.4
  • 11
    • 70349690087 scopus 로고    scopus 로고
    • Secure range queries in tiered sensor networks
    • Rio de Janeiro, Brazil, Apr.
    • J. Shi, R. Zhang, and Y. Zhang, "Secure range queries in tiered sensor networks," in IEEE INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009.
    • (2009) IEEE INFOCOM'09
    • Shi, J.1    Zhang, R.2    Zhang, Y.3
  • 12
    • 78651506283 scopus 로고    scopus 로고
    • A spatiotemporal approach for secure range queries in tiered sensor networks
    • Jan.
    • -. "A spatiotemporal approach for secure range queries in tiered sensor networks," IEEE Trans. Wireless Commun., vol. 10, no. 1, pp. 264-273, Jan. 2011.
    • (2011) IEEE Trans. Wireless Commun. , vol.10 , Issue.1 , pp. 264-273
    • Shi, J.1    Zhang, R.2    Zhang, Y.3
  • 13
    • 77953310348 scopus 로고    scopus 로고
    • SafeQ: Secure and efficient query processing in sensor networks
    • F. Chen and A. Liu, "SafeQ: Secure and efficient query processing in sensor networks," in INFOCOM'10, San Diego, CA, Mar. 2010, pp. 1-9.
    • (2010) INFOCOM'10, San Diego, CA, Mar. , pp. 1-9
    • Chen, F.1    Liu, A.2
  • 15
    • 85065578926 scopus 로고    scopus 로고
    • A privacy-preserving index for range queries
    • Toronto, Canada, Aug.
    • B. Hore, S. Mehrotra, and G. Tsudik, "A privacy-preserving index for range queries," in VLDB'04, Toronto, Canada, Aug. 2004, pp. 720-731.
    • (2004) VLDB'04 , pp. 720-731
    • Hore, B.1    Mehrotra, S.2    Tsudik, G.3
  • 16
    • 33144467903 scopus 로고    scopus 로고
    • Attack-resistant location estimation in sensor networks
    • Los Angeles, CA, Apr.
    • D. Liu, P. Ning, and W. Du, "Attack-resistant location estimation in sensor networks," in IPSN'05, Los Angeles, CA, Apr. 2005.
    • (2005) IPSN'05
    • Liu, D.1    Ning, P.2    Du, W.3
  • 17
    • 33947309703 scopus 로고    scopus 로고
    • Secure localization and authentication in ultra-wideband sensor networks
    • DOI 10.1109/JSAC.2005.863855
    • Y. Zhang, W. Liu, Y. Fang, and D. Wu, "Secure localization and authentication in ultra-wideband sensor networks," IEEE J. Sel. Areas Commun., Special Issue on UWB Wireless Communications-Theory and Applications, vol. 24, no. 4, pp. 829-835, Apr. 2006. (Pubitemid 46438080)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.4 , pp. 829-835
    • Zhang, Y.1    Liu, W.2    Fang, Y.3    Wu, D.4
  • 18
    • 77950169459 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Oakland, CA, May
    • H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks," in IEEE S&P'03, Oakland, CA, May 2003.
    • (2003) IEEE S&P'03
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 20
    • 33144476837 scopus 로고    scopus 로고
    • Location-based compromise-tolerant security mechanisms for wireless sensor networks
    • DOI 10.1109/JSAC.2005.861382
    • Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-based compromisetolerant security mechanisms for wireless sensor networks," IEEE J. Sel. Areas Commun., Special Issue on Security in Wireless Ad Hoc Networks, vol. 24, no. 2, pp. 247-260, Feb. 2006. (Pubitemid 43269747)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 21
    • 34548205306 scopus 로고    scopus 로고
    • iPAK: An in-situ pairwise key bootstrapping scheme for wireless sensor networks
    • DOI 10.1109/TPDS.2007.1063
    • L. Ma, X. Cheng, F. Liu, F. An, and M. Rivera, "iPAK: An in-situ pairwise key bootstrapping scheme for wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 8, pp. 1174-1184, Aug. 2007. (Pubitemid 47315997)
    • (2007) IEEE Transactions on Parallel and Distributed Systems , vol.18 , Issue.8 , pp. 1174-1184
    • Ma, L.1    Cheng, X.2    Liu, F.3    An, F.4    Rivera, J.5
  • 22
    • 70349658629 scopus 로고    scopus 로고
    • DP2AC: Distributed privacypreserving access control in sensor networks
    • Rio de Janeiro, Brazil, Apr.
    • R. Zhang, Y. Zhang, and K. Ren, "DP2AC: Distributed privacypreserving access control in sensor networks," in IEEE INFOCOM'09, Rio de Janeiro, Brazil, Apr. 2009.
    • (2009) IEEE INFOCOM'09
    • Zhang, R.1    Zhang, Y.2    Ren, K.3
  • 23
    • 77953304573 scopus 로고    scopus 로고
    • Verifiable fine-grained top-k queries in tiered sensor networks
    • San Diego, CA, Mar.
    • R. Zhang, J. Shi, Y. Liu, and Y. Zhang, "Verifiable fine-grained top-k queries in tiered sensor networks," in INFOCOM'10, San Diego, CA, Mar. 2010.
    • (2010) INFOCOM'10
    • Zhang, R.1    Shi, J.2    Liu, Y.3    Zhang, Y.4
  • 24
    • 26444532494 scopus 로고    scopus 로고
    • OCB: A block-cipher mode of operation for efficient authenticated encryption
    • Aug.
    • P. Rogaway, M. Bellare, and J. Black, "OCB: A block-cipher mode of operation for efficient authenticated encryption," ACM Trans. Inf. Syst. Secur., vol. 6, no. 3, pp. 365-403, Aug. 2003.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.3 , pp. 365-403
    • Rogaway, P.1    Bellare, M.2    Black, J.3
  • 25
    • 85000276942 scopus 로고    scopus 로고
    • Multilevel ?TESLA: Broadcast authentication for distributed sensor networks
    • D. Liu and P. Ning, "Multilevel ?TESLA: Broadcast authentication for distributed sensor networks," Trans. Embedded Computing Sys., vol. 3, no. 4, pp. 800-836, 2004.
    • (2004) Trans. Embedded Computing Sys. , vol.3 , Issue.4 , pp. 800-836
    • Liu, D.1    Ning, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.