메뉴 건너뛰기




Volumn 9, Issue 4, 2014, Pages 681-694

Secure data aggregation in wireless sensor networks: Filtering out the attacker's impact

Author keywords

Attack resilient; Data aggregation; Hierarchical aggregation; In network aggregation; Sensor network security; Synopsis diffusion

Indexed keywords

AGGREGATES; ALGORITHMS; BASE STATIONS; DIFFUSION; ENERGY UTILIZATION; NETWORK SECURITY; SENSOR NETWORKS;

EID: 84896928233     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2307197     Document Type: Article
Times cited : (106)

References (26)
  • 1
    • 77958138552 scopus 로고    scopus 로고
    • Scanning the issue
    • Apr
    • M. Liu, N. Patwari, and A. Terzis, "Scanning the issue," Proc. IEEE, vol. 98, no. 11, pp. 1804-1807, Apr. 2010.
    • (2010) Proc. IEEE , vol.98 , Issue.11 , pp. 1804-1807
    • Liu, M.1    Patwari, N.2    Terzis, A.3
  • 2
    • 77958146433 scopus 로고    scopus 로고
    • Embedded imagers: Detecting, localizing, and recognizing objects and events in natural habitats
    • Nov
    • T. Ko, J. Hyman, E. Graham, M. Hansen, S. Soatto, and D. Estrin, "Embedded imagers: Detecting, localizing, and recognizing objects and events in natural habitats," Proc. IEEE, vol. 98, no. 11, pp. 1934-1946, Nov. 2010.
    • (2010) Proc. IEEE , vol.98 , Issue.11 , pp. 1934-1946
    • Ko, T.1    Hyman, J.2    Graham, E.3    Hansen, M.4    Soatto, S.5    Estrin, D.6
  • 3
    • 77958152088 scopus 로고    scopus 로고
    • Environmental wireless sensor networks
    • Nov
    • P. Corke, T. Wark, R. Jurdak, W. Hu, P. Valencia, and D. Moore, "Environmental wireless sensor networks," Proc. IEEE, vol. 98, no. 11, pp. 1903-1917, Nov. 2010.
    • (2010) Proc. IEEE , vol.98 , Issue.11 , pp. 1903-1917
    • Corke, P.1    Wark, T.2    Jurdak, R.3    Hu, W.4    Valencia, P.5    Moore, D.6
  • 11
    • 71049159106 scopus 로고    scopus 로고
    • Secure and highly-available aggregation queries in large-scale sensor networks via set sampling
    • H. Yu, "Secure and highly-available aggregation queries in large-scale sensor networks via set sampling," in Proc. Int. Conf. Inf. Process. Sensor Netw., 2009, pp. 1-12.
    • (2009) Proc. Int. Conf. Inf. Process. Sensor Netw , pp. 1-12
    • Yu, H.1
  • 12
    • 84861116512 scopus 로고    scopus 로고
    • Secure data aggregation in wireless sensor networks
    • Jun
    • S. Roy, M. Conti, S. Setia, and S. Jajodia, "Secure data aggregation in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 3, pp. 1040-1052, Jun. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.3 , pp. 1040-1052
    • Roy, S.1    Conti, M.2    Setia, S.3    Jajodia, S.4
  • 15
    • 0020828424 scopus 로고
    • Probabilistic counting algorithms for data base applications
    • P. Flajolet and G. N. Martin, "Probabilistic counting algorithms for data base applications," J. Comput. Syst. Sci., vol. 31, no. 2, pp. 182-209, 1985.
    • (1985) J. Comput. Syst. Sci , vol.31 , Issue.2 , pp. 182-209
    • Flajolet, P.1    Martin, G.N.2
  • 17
    • 33845747795 scopus 로고    scopus 로고
    • Secure hierarchical in-network aggregation in sensor networks
    • DOI 10.1145/1180405.1180440, 1180440, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
    • H. Chan, A. Perrig, and D. Song, "Secure hierarchical in-network aggregation in sensor networks," in Proc. ACM Conf. Comput. Commun. Security (CCS), 2006, pp. 278-287. (Pubitemid 47131376)
    • (2006) Proceedings of the ACM Conference on Computer and Communications Security , pp. 278-287
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 18
    • 80051910121 scopus 로고    scopus 로고
    • Secure aggregation with malicious node revocation in sensor networks
    • B. Chen and H. Yu, "Secure aggregation with malicious node revocation in sensor networks," in Proc. 31st Int. Conf. Distrib. Comput. Syst. (ICDCS), 2011, pp. 581-592.
    • (2011) Proc. 31st Int. Conf. Distrib. Comput. Syst. (ICDCS) , pp. 581-592
    • Chen, B.1    Yu, H.2
  • 25
    • 34548301953 scopus 로고    scopus 로고
    • PDA: Privacy-preserving data aggregation in wireless sensor networks
    • DOI 10.1109/INFCOM.2007.237, 4215819, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. F. Abdelzaher, "PDA: Privacy-preserving data aggregation in wireless sensor networks," in Proc. IEEE Int. Conf. Comput. Commun. (INFOCOM), May 2007, pp. 2045-2053. (Pubitemid 47334437)
    • (2007) Proceedings - IEEE INFOCOM , pp. 2045-2053
    • He, W.1    Liu, X.2    Nguyen, H.3    Nahrstedt, K.4    Abdelzaher, T.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.