메뉴 건너뛰기




Volumn 25, Issue 7, 2013, Pages 1471-1483

CDAMA: Concealed data aggregation scheme for multiple applications in wireless sensor networks

Author keywords

Concealed data aggregation; elliptic curve cryptography; homomorphic encryption; wireless sensor networks

Indexed keywords

APPLICATION ENVIRONMENT; COMPREHENSIVE ANALYSIS; DATA AGGREGATION; ELLIPTIC CURVE CRYPTOGRAPHY; ENCRYPTION SYSTEM; HO-MOMORPHIC ENCRYPTIONS; MULTI-APPLICATION; MULTIPLE APPLICATIONS;

EID: 84878316913     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2012.94     Document Type: Article
Times cited : (72)

References (40)
  • 4
    • 4243082091 scopus 로고    scopus 로고
    • Security in wireless sensor networks
    • June
    • A. Perrig, J. Stankovic, and D. Wagner, "Security in Wireless Sensor Networks," Comm. ACM, vol. 47, no. 6, pp. 53-57, June 2004.
    • (2004) Comm. ACM , vol.47 , Issue.6 , pp. 53-57
    • Perrig, A.1    Stankovic, J.2    Wagner, D.3
  • 6
    • 32644435647 scopus 로고    scopus 로고
    • Energy-efficient secure pattern based data aggregation for wireless sensor networks
    • DOI 10.1016/j.comcom.2004.12.029, PII S0140366405000411
    • H. Cam, S. Ozdemir, P. Nair, D. Muthuavinashiappan, and H.O. Sanli, "Energy-Efficient Secure Pattern Based Data Aggregation for Wireless Sensor Networks," Computer Comm., vol. 29, no. 4, pp. 446-455, 2006. (Pubitemid 43243228)
    • (2006) Computer Communications , vol.29 , Issue.4 , pp. 446-455
    • Cam, H.1    Ozdemir, S.2    Nair, P.3    Muthuavinashiappan, D.4    Ozgur Sanli, H.5
  • 8
    • 17144411499 scopus 로고    scopus 로고
    • Classify encrypted data in wireless sensor networks
    • 2004 IEEE 60th Vehicular Technology Conference, VTC2004-Fall: Wireless Technologies for Global Security
    • Y. Wu, D. Ma, T. Li, and R.H. Deng, "Classify Encrypted Data in Wireless Sensor Networks," Proc. IEEE 60th Vehicular Technology Conf., pp. 3236-3239, 2004. (Pubitemid 40513096)
    • (2004) IEEE Vehicular Technology Conference , vol.60 , Issue.5 , pp. 3236-3239
    • Wu, Y.1    Ma, D.2    Li, T.3    Deng, R.H.4
  • 9
    • 33748351402 scopus 로고    scopus 로고
    • Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptation
    • DOI 10.1109/TMC.2006.144, 1683790
    • D. Westhoff, J. Girao, and M. Acharya, "Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation," IEEE Trans. Mobile Computing, vol. 5, no. 10, pp. 1417-1431, Oct. 2006. (Pubitemid 44335247)
    • (2006) IEEE Transactions on Mobile Computing , vol.5 , Issue.10 , pp. 1417-1431
    • Westhoff, D.1    Girao, J.2    Acharya, M.3
  • 11
  • 12
    • 34249316910 scopus 로고    scopus 로고
    • TinyPEDS: Tiny persistent encrypted data storage in asynchronous wireless sensor networks
    • DOI 10.1016/j.adhoc.2006.05.004, PII S1570870506000321
    • J. Girao, D. Westhoff, E. Mykletun, and T. Araki, "Tinypeds: Tiny Persistent Encrypted Data Storage in Asynchronous Wireless Sensor Networks," Ad Hoc Networks, vol. 5, no. 7, pp. 1073-1089, 2007. (Pubitemid 46819205)
    • (2007) Ad Hoc Networks , vol.5 , Issue.7 , pp. 1073-1089
    • Girao, J.1    Westhoff, D.2    Mykletun, E.3    Araki, T.4
  • 15
    • 76949090588 scopus 로고    scopus 로고
    • A survey on the encryption of convergecast-traffic with in-network processing
    • Jan.-Mar.
    • S. Peter, D. Westhoff, and C. Castelluccia, "A Survey on the Encryption of Convergecast-Traffic with In-Network Processing," IEEE Trans. Dependable and Secure Computing, vol. 7, no. 1, pp. 20-34, Jan.-Mar. 2010.
    • (2010) IEEE Trans. Dependable and Secure Computing , vol.7 , Issue.1 , pp. 20-34
    • Peter, S.1    Westhoff, D.2    Castelluccia, C.3
  • 16
    • 84870707379 scopus 로고    scopus 로고
    • A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack
    • Advances in Cryptology - CRYPTO '98
    • R. Cramer and V. Shoup, "A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack," Proc. 18th Ann. Int'l Cryptology Conf. Advances in Cryptology, pp. 13-25, 1998. (Pubitemid 128118994)
    • (1998) Lecture Notes in Computer Science , Issue.1462 , pp. 13-25
    • Cramer, R.1    Shoup, V.2
  • 17
    • 84945300542 scopus 로고    scopus 로고
    • A provably secure additive and multiplicative privacy homomorphism
    • J. Domingo-Ferrer, "A Provably Secure Additive and Multiplicative Privacy Homomorphism," Proc. Fifth Int'l Conf. Information Security, pp. 471-483, 2002.
    • (2002) Proc. Fifth Int'l Conf. Information Security , pp. 471-483
    • Domingo-Ferrer, J.1
  • 23
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • DOI 10.1145/1218556.1218559
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," ACM Trans. Sensor Networks, vol. 2, no. 4, pp. 500-528, 2006. (Pubitemid 46278640)
    • (2006) ACM Transactions on Sensor Networks , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 24
  • 28
    • 39749088678 scopus 로고    scopus 로고
    • Low-energy finite field arithmetic primitives for implementing security in wireless sensor networks
    • K. McCusker, N. O'Connor, and D. Diamond, "Low-Energy Finite Field Arithmetic Primitives for Implementing Security in Wireless Sensor Networks," Proc. Int'l Conf. Comm., Circuits and Systems, vol. 3, 2006.
    • (2006) Proc. Int'l Conf. Comm., Circuits and Systems , vol.3
    • McCusker, K.1    O'Connor, N.2    Diamond, D.3
  • 33
    • 79551598148 scopus 로고    scopus 로고
    • Finding composite order ordinary elliptic curves using the cocks-pinch method
    • D. Boneh, K. Rubin, and A. Silverberg, "Finding Composite Order Ordinary Elliptic Curves Using the Cocks-Pinch Method," J. Number Theory, vol. 131, pp. 832-841, 2011.
    • (2011) J. Number Theory , vol.131 , pp. 832-841
    • Boneh, D.1    Rubin, K.2    Silverberg, A.3
  • 35
    • 29144433598 scopus 로고    scopus 로고
    • Cryptanalysis of an algebraic privacy homomorph-ism
    • D. Wagner, "Cryptanalysis of an Algebraic Privacy Homomorph-ism," Proc. Sixth Information Security Conf., pp. 234-239, 2003.
    • (2003) Proc. Sixth Information Security Conf. , pp. 234-239
    • Wagner, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.