메뉴 건너뛰기




Volumn 57, Issue , 2011, Pages 135-150

SeDAP: Secure data aggregation protocol in privacy aware wireless sensor networks

Author keywords

End to end secure data aggregation; Privacy; WSN

Indexed keywords

DATA PRIVACY; SENSOR NODES; WIRELESS SENSOR NETWORKS;

EID: 84872838789     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-23583-2_10     Document Type: Conference Paper
Times cited : (6)

References (27)
  • 3
    • 34248662954 scopus 로고    scopus 로고
    • In-network aggregation techniques for wireless sensor networks: A survey
    • April
    • Fasolo, Rossi, M., Widmer, J., Zorzi, M.: In-network aggregation techniques for wireless sensor networks: A survey. IEEE Wireless Communications (April 2007)
    • (2007) IEEE Wireless Communications
    • Fasolo Rossi, M.1    Widmer, J.2    Zorzi, M.3
  • 5
    • 77951429167 scopus 로고    scopus 로고
    • Proc. of The Third Int. Conf. on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM, Sliema, Malta (October
    • Grieco, L.A., Boggia, G., Sicari, S., Colombo, P.: Secure wireless multimedia sensor networks: a survey. In: Proc. of The Third Int. Conf. on Mobile Ubiquitous Computing, Systems, Services and Technologies, UBICOMM, Sliema, Malta (October 2009)
    • (2009) Secure Wireless Multimedia Sensor Networks: A Survey.
    • Grieco, L.A.1    Boggia, G.2    Sicari, S.3    Colombo, P.4
  • 6
    • 67549118456 scopus 로고    scopus 로고
    • Secure data aggregation in wireless sensor networks: A comprehensive overview
    • Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: a comprehensive overview. Computer Networks 53 (2009)
    • (2009) Computer Networks 53
    • Ozdemir, S.1    Xiao, Y.2
  • 12
    • 0003187764 scopus 로고
    • Directive 95/46/EC of the European Parliament
    • November 23
    • Directive 95/46/EC of the European Parliament. Official Journal of the European Communities, (L.281), 31 (November 23, 1995)
    • (1995) Official Journal of the European Communities, L.281 , pp. 31
  • 18
    • 0142103313 scopus 로고    scopus 로고
    • Security and privacy in sensor networks
    • March
    • Chan, H., Perrig, A.: Security and privacy in sensor networks. IEEE Computer Magazine, 103-105 (March 2003)
    • (2003) IEEE Computer Magazine , pp. 103-105
    • Chan, H.1    Perrig, A.2
  • 20
    • 0003483188 scopus 로고    scopus 로고
    • Protecting privacy when disclosing information: K-anonymity and its enforcement through generalization and suppression
    • Computer Science Laboratory SRI International
    • Samarati, P., Sweeney, L.: Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Technical Report SRI-CSL- 98-04, Computer Science Laboratory, SRI International (1998)
    • (1998) Technical Report SRI-CSL-98-04
    • Samarati, P.1    Sweeney, L.2
  • 21
    • 35048866963 scopus 로고    scopus 로고
    • A methodological assessment of location privacy risks in wireless hotspot networks
    • Springer, Heidelberg Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.)
    • Gruteser, M., Grunwald, D.: A methodological assessment of location privacy risks in wireless hotspot networks. In: Hutter, D., Müller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol. 2802, pp. 10-24. Springer, Heidelberg (2004)
    • (2004) Security in Pervasive Computing. LNCS , vol.2802 , pp. 10-24
    • Gruteser, M.1    Grunwald, D.2
  • 24
    • 14844294769 scopus 로고    scopus 로고
    • Privacy and security in library RFID: Issues, practices, and architectures
    • Molnar, D., Wagner, D.: Privacy and security in library rfid: Issues, practices, and architectures. In: Proceedings of ACM CCS (2004)
    • (2004) Proceedings of Rftxt ACM CCS
    • Molnar, D.1    Wagner, D.2
  • 25
    • 34248672225 scopus 로고    scopus 로고
    • SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
    • September
    • Yang, Y., Wang, X., Zhu, S., Cao, G.: Sdap: a secure hop-by-hop data aggregation protocol for sensor networks. In: ACM MOBIHOC (September 2006)
    • (2006) ACM MOBIHOC
    • Yang, Y.1    Wang, X.2    Zhu, S.3    Cao, G.4
  • 26
    • 33748351402 scopus 로고    scopus 로고
    • Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
    • DOI 10.1109/TMC.2006.144, 1683790
    • Westhoff, D., Girao, J., Acharya, M.: Concealed data aggregation for reverse multicast traffic in sensor networks: encryption key distribution and routing adaptation. IEEE Trans. Mobile Comput. 5, 1417-1431 (2006) (Pubitemid 44335247)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.10 , pp. 1417-1431
    • Westhoff, D.1    Girao, J.2    Acharya, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.