메뉴 건너뛰기




Volumn 23, Issue 10, 2012, Pages 1819-1830

A distributed fault/intrusion-tolerant sensor data storage scheme based on network coding and homomorphic fingerprinting

Author keywords

data maintenance; Distributed sensor data storage; homomorphic fingerprinting; network coding

Indexed keywords

CRITICAL ISSUES; DATA AVAILABILITY; DATA INTEGRITY; DATA MAINTENANCE; DATA STORAGE; DISTRIBUTED DATA; DISTRIBUTED SENSOR; HOMOMORPHIC FINGERPRINTING; ROBUST SENSOR; SENSOR DATA; SOURCE DATA; STORAGE NETWORKS; WIRELESS SENSOR NETWORK (WSNS);

EID: 84865682593     PISSN: 10459219     EISSN: None     Source Type: Journal    
DOI: 10.1109/TPDS.2011.294     Document Type: Article
Times cited : (26)

References (35)
  • 1
    • 70349659577 scopus 로고    scopus 로고
    • Dependable and secure sensor data storage with dynamic integrity and assurance
    • Q. Wang, K. Ren, W. Lou, and Y. Zhang, "Dependable and Secure Sensor Data Storage With Dynamic Integrity and Assurance," Proc. IEEE INFOCOM, 2009.
    • (2009) Proc. IEEE INFOCOM
    • Wang, Q.1    Ren, K.2    Lou, W.3    Zhang, Y.4
  • 4
    • 33646711258 scopus 로고    scopus 로고
    • High availability in DHTs: Erasure coding vs. replication
    • R. Rodrigues and B. Liskov, "High Availability in DHTs: Erasure Coding vs. Replication," Peer-to-Peer Systems, 2005.
    • (2005) Peer-to-Peer Systems
    • Rodrigues, R.1    Liskov, B.2
  • 5
    • 34548339912 scopus 로고    scopus 로고
    • Growth codes: Maximizing sensor network data persistence
    • A. Kamra and V. Misra, "Growth Codes: Maximizing Sensor Network Data Persistence," Proc. ACM SIGCOMM, 2006.
    • (2006) Proc. ACM SIGCOMM
    • Kamra, A.1    Misra, V.2
  • 6
    • 34548355137 scopus 로고    scopus 로고
    • Data persisitence in large-scale sensor networks with decentralized fountain codes
    • Y. Lin, B. Liang, and B. Li, "Data Persisitence in Large-Scale Sensor Networks with Decentralized Fountain Codes," Proc. IEEE INFOCOM, 2007.
    • (2007) Proc. IEEE INFOCOM
    • Lin, Y.1    Liang, B.2    Li, B.3
  • 12
    • 34249316910 scopus 로고    scopus 로고
    • TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks
    • DOI 10.1016/j.adhoc.2006.05.004, PII S1570870506000321
    • J. Girao, D. Westhoff, E. Mykletun, and T. Araki, "Tinypeds: Tiny Persistent Encrypted Data Storage in Asynchronous Wireless Sensor Networks," Elsevier Ad Hoc Networks, vol. 5, no. 7, 1073- 1089, 2007. (Pubitemid 46819205)
    • (2007) Ad Hoc Networks , vol.5 , Issue.7 , pp. 1073-1089
    • Girao, J.1    Westhoff, D.2    Mykletun, E.3    Araki, T.4
  • 15
    • 35048880121 scopus 로고    scopus 로고
    • Dependable and secure data storage in wireless Ad Hoc networks: An assessment of DS2
    • S. Chessa, R.D. Pietro, and P. Maestrini, "Dependable and Secure Data Storage in Wireless Ad Hoc Networks: An Assessment of DS2," Proc. WONS, 2004.
    • (2004) Proc. WONS
    • Chessa, S.1    Pietro, R.D.2    Maestrini, P.3
  • 16
    • 29844438193 scopus 로고    scopus 로고
    • Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
    • W. Zhang, H. Song, S. Zhu, and G. Cao, "Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks," Proc. ACM MobiHoc, 2005.
    • (2005) Proc. ACM MobiHoc
    • Zhang, W.1    Song, H.2    Zhu, S.3    Cao, G.4
  • 19
    • 0024641589 scopus 로고
    • Efficient dispersal of information for security, load balancing, and fault tolerance
    • M.O. Rabin, "Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance," J. ACM, vol. 36, no. 2, pp. 335- 348, 1989.
    • (1989) J. ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 24
    • 33745135399 scopus 로고    scopus 로고
    • On achieving maximum multicast throughput in undirected networks
    • DOI 10.1109/TIT.2006.874515
    • Z. Li, B. Li, and L.C. Lau, "On Achieving Maximum Multicast throughput in Undirected Networks," IEEE Trans. Information Theory, vol. 52, no. 6, pp. 2467-2485, June 2006. (Pubitemid 43898904)
    • (2006) IEEE Transactions on Information Theory , vol.52 , Issue.6 , pp. 2467-2485
    • Li, Z.1    Li, B.2    Lau, L.C.3
  • 25
    • 28844481518 scopus 로고    scopus 로고
    • Minimum-energy multicast in mobile ad hoc networks using network coding
    • DOI 10.1109/TCOMM.2005.857148
    • Y. Wu, P. Chou, and S. Kung, "Minimum-Energy Multicast in Mobile Ad Hoc Networks Using Network Coding," IEEE Trans. Comm., vol. 53, no. 11, pp. 1906-1918, Nov. 2005. (Pubitemid 41763708)
    • (2005) IEEE Transactions on Communications , vol.53 , Issue.11 , pp. 1906-1918
    • Wu, Y.1    Chou, P.A.2    Kung, S.-Y.3
  • 26
    • 51349130622 scopus 로고    scopus 로고
    • An efficient signature-based scheme for securing network coding against pollution attacks
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An Efficient Signature-Based Scheme for Securing Network Coding against Pollution Attacks," Proc. IEEE INFOCOM, 2008.
    • (2008) Proc. IEEE INFOCOM
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 27
    • 70349664122 scopus 로고    scopus 로고
    • An efficient scheme for securing XOR network coding against pollution attacks
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An Efficient Scheme for Securing XOR Network Coding Against Pollution Attacks," Proc. IEEE INFOCOM, 2009.
    • (2009) Proc. IEEE INFOCOM
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 29
    • 79960873240 scopus 로고    scopus 로고
    • Padding for orthogonality: Efficient subspace authentication for network coding
    • P. Zhang, Y. Jiang, C. Lin, H. Yao, A. Wasef, and X. Shen, "Padding for Orthogonality: Efficient Subspace Authentication for Network Coding," Proc. IEEE INFOCOM, 2011.
    • (2011) Proc. IEEE INFOCOM
    • Zhang, P.1    Jiang, Y.2    Lin, C.3    Yao, H.4    Wasef, A.5    Shen, X.6
  • 30
    • 73449086635 scopus 로고    scopus 로고
    • An efficient dynamic-identity based signature scheme for secure network coding
    • Y. Jiang, H. Zhu, M. Shi, X. Shen, and C. Lin, "An Efficient Dynamic-Identity Based Signature Scheme for Secure Network Coding," Elsevier Ad Hoc Networks, vol. 54, no. 1, pp. 28-40, 2010.
    • (2010) Elsevier Ad Hoc Networks , vol.54 , Issue.1 , pp. 28-40
    • Jiang, Y.1    Zhu, H.2    Shi, M.3    Shen, X.4    Lin, C.5
  • 31
    • 79959372660 scopus 로고    scopus 로고
    • A scalable and robust key pre-distribution scheme with network coding for sensor data storage networks
    • R. Zeng, Y. Jiang, C. Lin, Y. Fan, and X. Shen, "A Scalable and Robust Key Pre-Distribution Scheme with Network Coding for Sensor Data Storage Networks," ELSEVIER Computer Networks, vol. 55, no. 10, pp. 2534-2544, 2011.
    • ELSEVIER Computer Networks , vol.55 , Issue.10 , pp. 2534-2544
    • Zeng, R.1    Jiang, Y.2    Lin, C.3    Fan, Y.4    Shen, X.5
  • 33
    • 77955178649 scopus 로고    scopus 로고
    • On homomorphic signatures for network coding
    • Set
    • A. Yun, J. Cheon, and Y. Kim, "On Homomorphic Signatures for Network Coding," IEEE Trans. Computers, vol. 59, no. 9, pp. 1295- 1296, Sept. 2010.
    • (2010) IEEE Trans. Computers , vol.59 , Issue.9 , pp. 1295-1296
    • Yun, A.1    Cheon, J.2    Kim, Y.3
  • 34
    • 70349682315 scopus 로고    scopus 로고
    • An efficient privacy- preserving scheme against traffic analysis attacks in network coding
    • Y. Fan, Y. Jiang, H. Zhu, and X. Shen, "An Efficient Privacy- Preserving Scheme Against Traffic Analysis Attacks in Network Coding," Proc. IEEE INFOCOM, 2009.
    • (2009) Proc. IEEE INFOCOM
    • Fan, Y.1    Jiang, Y.2    Zhu, H.3    Shen, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.