메뉴 건너뛰기




Volumn 64, Issue , 2014, Pages 159-179

Enhancing secure access to sensor data with user privacy support

Author keywords

Ladon; Performance; Privacy; PrivaKERB; Security; Sensors

Indexed keywords

KEY ESTABLISHMENTS; LADON; PERFORMANCE; PERFORMANCE REQUIREMENTS; PRIVAKERB; RESOURCE LIMITATIONS; SECURITY; SUITABLE SOLUTIONS;

EID: 84897727549     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2014.02.002     Document Type: Article
Times cited : (7)

References (48)
  • 5
    • 34247859642 scopus 로고    scopus 로고
    • Telemonitoring or structured telephone support programmes for patients with chronic heart failure: Systematic review and meta-analysis
    • R.A. Clark, S.C. Inglis, F.A. McAlister, J.G.F. Cleland, and S. Stewart Telemonitoring or structured telephone support programmes for patients with chronic heart failure: systematic review and meta-analysis BMJ: Brit. Med. J. 334 7600 2007 942 950
    • (2007) BMJ: Brit. Med. J. , vol.334 , Issue.7600 , pp. 942-950
    • Clark, R.A.1    Inglis, S.C.2    McAlister, F.A.3    Cleland, J.G.F.4    Stewart, S.5
  • 6
    • 84863560791 scopus 로고    scopus 로고
    • Ladon: End-to-end authorisation support for resource-deprived environments
    • J. Astorga, E. Jacob, M. Huarte, and M. Higuero Ladon: end-to-end authorisation support for resource-deprived environments IET Inform. Secur. 6 2 2012 93 101
    • (2012) IET Inform. Secur. , vol.6 , Issue.2 , pp. 93-101
    • Astorga, J.1    Jacob, E.2    Huarte, M.3    Higuero, M.4
  • 13
    • 41449098948 scopus 로고    scopus 로고
    • LEDS: Providing location-aware end-to-end data security in wireless sensor networks
    • DOI 10.1109/TMC.2007.70753, 4358997
    • K. Ren, W. Lou, and Y. Zhang LEDS: providing location-aware end-to-end data security in wireless sensor networks IEEE Trans. Mobile Comput. 7 5 2008 585 598 (Pubitemid 351454006)
    • (2008) IEEE Transactions on Mobile Computing , vol.7 , Issue.5 , pp. 585-598
    • Ren, K.1    Lou, W.2    Zhang, Y.3
  • 14
    • 10044284351 scopus 로고    scopus 로고
    • LEAP: Efficient security mechanisms for large-scale distributed sensor networks
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • S. Zhu, S. Setia, and S. Jajodia LEAP: efficient security mechanisms for large-scale distributed sensor networks Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03) 2003 ACM New York, NY, USA 62 72 (Pubitemid 40673789)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 62-72
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 15
    • 85016596484 scopus 로고    scopus 로고
    • LiSP: A lightweight security protocol for wireless sensor networks
    • T. Park, and K.G. Shin LiSP: a lightweight security protocol for wireless sensor networks ACM Trans. Embed. Comput. Syst. 3 3 2004 634 660
    • (2004) ACM Trans. Embed. Comput. Syst. , vol.3 , Issue.3 , pp. 634-660
    • Park, T.1    Shin, K.G.2
  • 16
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: Peer intermediaries for key establishment in sensor networks
    • Proceedings - IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies
    • H. Chan, A. Perrig, PIKE: peer intermediaries for key establishment in sensor networks, in: Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005), 2005, pp. 524-535. (Pubitemid 41390848)
    • (2005) Proceedings - IEEE INFOCOM , vol.1 , pp. 524-535
    • Chan, H.1    Perrig, A.2
  • 17
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • D. Liu, and P. Ning Establishing pairwise keys in distributed sensor networks Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03) 2003 ACM New York, NY, USA 52 61 (Pubitemid 40673788)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 52-61
    • Liu, D.1    Ning, P.2
  • 21
    • 80054769623 scopus 로고    scopus 로고
    • A scalable ID-based pairwise key establishment protocol for wireless sensor networks
    • H.-C. Lin, and Y.-M. Tseng A scalable ID-based pairwise key establishment protocol for wireless sensor networks J. Comput. 18 2 2007 13 24
    • (2007) J. Comput. , vol.18 , Issue.2 , pp. 13-24
    • Lin, H.-C.1    Tseng, Y.-M.2
  • 24
    • 84897701714 scopus 로고    scopus 로고
    • OAuth
    • OAuth. < http://oauth.net/ >.
  • 25
    • 84897718536 scopus 로고    scopus 로고
    • OpenID
    • OpenID. < http://openid.net/ >.
  • 26
    • 84897684142 scopus 로고    scopus 로고
    • Shibboleth
    • Shibboleth. < http://shibboleth.net/ >.
  • 28
    • 0000874415 scopus 로고
    • Limitations of the Kerberos authentication system
    • S.M. Bellovin, and M. Merritt Limitations of the Kerberos authentication system SIGCOMM Comput. Commun. Rev. 20 5 1990 119 132
    • (1990) SIGCOMM Comput. Commun. Rev. , vol.20 , Issue.5 , pp. 119-132
    • Bellovin, S.M.1    Merritt, M.2
  • 29
    • 0003370741 scopus 로고
    • A security risk of depending on synchronized clocks
    • L. Gong A security risk of depending on synchronized clocks SIGOPS Operat. Syst. Rev. 26 1 1992 49 53
    • (1992) SIGOPS Operat. Syst. Rev. , vol.26 , Issue.1 , pp. 49-53
    • Gong, L.1
  • 30
    • 0028466968 scopus 로고
    • SESAME: The solution to security for open distributed systems
    • P. Kaijser, T. Parker, and D. Pinkas SESAME: the solution to security for open distributed systems Comput. Commun. 17 7 1994 501 518
    • (1994) Comput. Commun. , vol.17 , Issue.7 , pp. 501-518
    • Kaijser, P.1    Parker, T.2    Pinkas, D.3
  • 35
    • 55649095270 scopus 로고    scopus 로고
    • Location privacy and anonymity preserving routing for wireless sensor networks
    • A.A. Nezhad, A. Miri, and D. Makrakis Location privacy and anonymity preserving routing for wireless sensor networks Comput. Netw. 52 18 2008 3433 3452
    • (2008) Comput. Netw. , vol.52 , Issue.18 , pp. 3433-3452
    • Nezhad, A.A.1    Miri, A.2    Makrakis, D.3
  • 36
    • 34548310311 scopus 로고    scopus 로고
    • Protecting receiver-location privacy in wireless sensor networks
    • DOI 10.1109/INFCOM.2007.227, 4215809, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • Y. Jian, S. Chen, Z. Zhang, L. Zhang, Protecting receiver-location privacy in wireless sensor networks, in: Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), 2007, pp. 1955-1963. (Pubitemid 47334427)
    • (2007) Proceedings - IEEE INFOCOM , pp. 1955-1963
    • Jian, Y.1    Chen, S.2    Zhang, Z.3    Zhang, L.4
  • 38
    • 84863522640 scopus 로고    scopus 로고
    • Distributed privacy-preserving access control in sensor networks
    • R. Zhang, Y. Zhang, and K. Ren Distributed privacy-preserving access control in sensor networks IEEE Trans. Parall. Distrib. Syst. 23 8 2012 1427 1438
    • (2012) IEEE Trans. Parall. Distrib. Syst. , vol.23 , Issue.8 , pp. 1427-1438
    • Zhang, R.1    Zhang, Y.2    Ren, K.3
  • 39
    • 80051783946 scopus 로고    scopus 로고
    • Internet-Draft draft-ietf-cat-kerberos-anoncred-00.txt, Internet Engineering Task Force, work in progress, March
    • A. Medvinsky, J. Cargille, M. Hur, Anonymous credentials in Kerberos, Internet-Draft draft-ietf-cat-kerberos-anoncred-00.txt, Internet Engineering Task Force, work in progress, March 1998.
    • (1998) Anonymous Credentials in Kerberos
    • Medvinsky, A.1    Cargille, J.2    Hur, M.3
  • 43
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • D. Dolev, and A. Yao On the security of public key protocols IEEE Trans. Inform. Theor. 29 2 1983 198 208
    • (1983) IEEE Trans. Inform. Theor. , vol.29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.2
  • 46
    • 84897684144 scopus 로고    scopus 로고
    • http://www.cryptopp.com/benchmarks.html.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.