메뉴 건너뛰기




Volumn 79, Issue 3, 2013, Pages 383-401

Trustworthiness analysis of sensor data in cyber-physical systems

Author keywords

Cyber physical system; False alarm; Sensor network; Trustworthiness analysis

Indexed keywords

CYBER PHYSICAL SYSTEM; EMBEDDED SYSTEMS; ENVIRONMENTAL TECHNOLOGY; ERRORS; SENSOR NETWORKS;

EID: 84872305339     PISSN: 00220000     EISSN: 10902724     Source Type: Journal    
DOI: 10.1016/j.jcss.2012.09.012     Document Type: Conference Paper
Times cited : (47)

References (39)
  • 1
    • 84872347452 scopus 로고    scopus 로고
    • http://battlegroundiraq.wordpress.com/2007/11/19/thermal-sensor-protects- troops-boosts-security/
  • 2
    • 84872346742 scopus 로고    scopus 로고
    • http://weather.unisys.com/hurricane/index.html
  • 3
    • 68949132746 scopus 로고    scopus 로고
    • Robust deployment of dynamic sensor networks for cooperative track detection
    • K. Baumgartner, S. Ferrari, and T. Wettergren Robust deployment of dynamic sensor networks for cooperative track detection IEEE Sens. J. 9 9 2009 1029 1048
    • (2009) IEEE Sens. J. , vol.9 , Issue.9 , pp. 1029-1048
    • Baumgartner, K.1    Ferrari, S.2    Wettergren, T.3
  • 5
    • 67651017955 scopus 로고    scopus 로고
    • Acoustic sensor network design for position estimation
    • V. Cevher, and L.M. Kaplan Acoustic sensor network design for position estimation ACM Trans. Sens. Netw. 5 3 2009
    • (2009) ACM Trans. Sens. Netw. , vol.5 , Issue.3
    • Cevher, V.1    Kaplan, L.M.2
  • 6
    • 0036974649 scopus 로고    scopus 로고
    • Freeway performance measurement system (PeMS): An operational analysis tool
    • T. Choe, A. Skabardonis, P. Varaiya, Freeway performance measurement system (PeMS): An operational analysis tool, in: TRB, 2002.
    • (2002) TRB
    • Choe, T.1    Skabardonis, A.2    Varaiya, P.3
  • 7
    • 77954742437 scopus 로고    scopus 로고
    • A secure multiparty computation privacy preserving OLAP framework over distributed XML data
    • A. Cuzzocrea, E. Bertino, A secure multiparty computation privacy preserving OLAP framework over distributed XML data, in: SAC, 2010, pp. 1666-1673.
    • (2010) SAC , pp. 1666-1673
    • Cuzzocrea, A.1    Bertino, E.2
  • 8
    • 80052338018 scopus 로고    scopus 로고
    • Privacy preserving OLAP over distributed XML data: A theoretically-sound secure-multiparty-computation approach
    • A. Cuzzocrea, and E. Bertino Privacy preserving OLAP over distributed XML data: A theoretically-sound secure-multiparty-computation approach J. Comput. System Sci. 77 6 2011
    • (2011) J. Comput. System Sci. , vol.77 , Issue.6
    • Cuzzocrea, A.1    Bertino, E.2
  • 9
    • 52949087952 scopus 로고    scopus 로고
    • A robust sampling-based framework for privacy preserving OLAP
    • A. Cuzzocrea, V. Russo, D. Sacca, A robust sampling-based framework for privacy preserving OLAP, in: DaWaK, 2008, pp. 97-114.
    • (2008) DaWaK , pp. 97-114
    • Cuzzocrea, A.1    Russo, V.2    Sacca, D.3
  • 10
    • 78651343679 scopus 로고    scopus 로고
    • Balancing accuracy and privacy of OLAP aggregations on data cubes
    • A. Cuzzocrea, D. Sacca, Balancing accuracy and privacy of OLAP aggregations on data cubes, in: DOLAP, 2010, pp. 93-98.
    • (2010) DOLAP , pp. 93-98
    • Cuzzocrea, A.1    Sacca, D.2
  • 12
    • 1542376950 scopus 로고    scopus 로고
    • Cleaning and querying noisy sensors
    • E. Elnahrawy, B. Nath, Cleaning and querying noisy sensors, in: WSNA, 2003.
    • (2003) WSNA
    • Elnahrawy, E.1    Nath, B.2
  • 14
    • 79953811849 scopus 로고    scopus 로고
    • A survey of outlier detection methods in network anomaly identification
    • P. Gogoi, D. Bhattacharyya, B. Borah, and J. Kalita A survey of outlier detection methods in network anomaly identification J. Comput. 54 4 2011 570 588
    • (2011) J. Comput. , vol.54 , Issue.4 , pp. 570-588
    • Gogoi, P.1    Bhattacharyya, D.2    Borah, B.3    Kalita, J.4
  • 15
    • 35549010227 scopus 로고    scopus 로고
    • Using sensorranks for in-network detection of faulty readings in wireless sensor networks
    • X.-Y. Hsiao, W.-C. Peng, C.-C. Hung, W.-C. Lee, Using sensorranks for in-network detection of faulty readings in wireless sensor networks, in: DEWMA, 2007.
    • (2007) DEWMA
    • Hsiao, X.-Y.1    Peng, W.-C.2    Hung, C.-C.3    Lee, W.-C.4
  • 19
    • 84872285907 scopus 로고    scopus 로고
    • Handling failures in cyber-physical systems: Potential directions
    • T. Johnson, S. Mitra, Handling failures in cyber-physical systems: Potential directions, in: The Real-Time Systems Symposium, 2009.
    • (2009) The Real-Time Systems Symposium
    • Johnson, T.1    Mitra, S.2
  • 21
    • 1842478856 scopus 로고    scopus 로고
    • Distributed bayesian algorithms for fault-tolerant event region detection in wireless sensor networks
    • B. Krishnamachari, and S. Iyengar Distributed bayesian algorithms for fault-tolerant event region detection in wireless sensor networks IEEE Trans. Comput. 53 3 2004
    • (2004) IEEE Trans. Comput. , vol.53 , Issue.3
    • Krishnamachari, B.1    Iyengar, S.2
  • 22
    • 84864219611 scopus 로고    scopus 로고
    • Cb manet scenario data distribution
    • T. Krout, Cb manet scenario data distribution, Technique Report of BBN, 2007.
    • (2007) Technique Report of BBN
    • Krout, T.1
  • 23
    • 49649119406 scopus 로고    scopus 로고
    • Cyber physical systems: Design challenges
    • E.A. Lee, Cyber physical systems: Design challenges, in: ISORC, 2008.
    • (2008) ISORC
    • Lee, E.A.1
  • 24
    • 51349088323 scopus 로고    scopus 로고
    • Carweb: A traffic data collection platform
    • C. Lo, W. Peng, Carweb: A traffic data collection platform, in: MDM, 2008.
    • (2008) MDM
    • Lo, C.1    Peng, W.2
  • 33
    • 35448932482 scopus 로고    scopus 로고
    • Effective variation management for pseudo periodical streams
    • L. Tang, B. Cui, H. Li, G. Miao, D. Yang, X. Zhou, Effective variation management for pseudo periodical streams, in: SIGMOD, 2007.
    • (2007) SIGMOD
    • Tang, L.1    Cui, B.2    Li, H.3    Miao, G.4    Yang, D.5    Zhou, X.6
  • 34
    • 79951761309 scopus 로고    scopus 로고
    • Tru-alarm: Trustworthiness analysis of sensor networks in cyber-physical systems
    • L. Tang, X. Yu, S. Kim, J. Han, C. Hung, W. Peng, Tru-alarm: Trustworthiness analysis of sensor networks in cyber-physical systems, in: ICDM, 2010.
    • (2010) ICDM
    • Tang, L.1    Yu, X.2    Kim, S.3    Han, J.4    Hung, C.5    Peng, W.6
  • 36
    • 44649191726 scopus 로고    scopus 로고
    • Performance of search via track-before-detect for distributed sensor networks
    • T. Wettergren Performance of search via track-before-detect for distributed sensor networks IEEE Trans. Aerosp. Electron. Syst. 44 1 2008 314 325
    • (2008) IEEE Trans. Aerosp. Electron. Syst. , vol.44 , Issue.1 , pp. 314-325
    • Wettergren, T.1
  • 37
    • 77951184519 scopus 로고    scopus 로고
    • Filtering and refinement: A two-stage approach for efficient and effective anomaly detection
    • X. Yu, L. Tang, J. Han, Filtering and refinement: A two-stage approach for efficient and effective anomaly detection, in: ICDM, 2009.
    • (2009) ICDM
    • Yu, X.1    Tang, L.2    Han, J.3
  • 38
    • 77955082590 scopus 로고    scopus 로고
    • Outlier detection techniques for wireless sensor networks: A survey
    • Y. Zhang, N. Meratnia, and P.J.M. Havinga Outlier detection techniques for wireless sensor networks: A survey IEEE Commun. Surv. Tutor. 12 2 2010 159 170
    • (2010) IEEE Commun. Surv. Tutor. , vol.12 , Issue.2 , pp. 159-170
    • Zhang, Y.1    Meratnia, N.2    Havinga, P.J.M.3
  • 39
    • 33144487909 scopus 로고    scopus 로고
    • Connected sensor cover: Self-organization of sensor networks for efficient query execution
    • H. Gupta, Z. Zhou, S.R. Das, and Q. Gu Connected sensor cover: self-organization of sensor networks for efficient query execution IEEE/ACM Trans. Netw. 14 1 2006 55 67
    • (2006) IEEE/ACM Trans. Netw. , vol.14 , Issue.1 , pp. 55-67
    • Gupta, H.1    Zhou, Z.2    Das, S.R.3    Gu, Q.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.