Data Aggregation Security Challenge in Wireless Sensor Networks
暂无分享,去创建一个
Makhlouf Aliouat | Tanveer A. Zia | Abdelhak Mourad Guéroui | Nabila Labraoui | T. Zia | A. Guéroui | Nabila Labraoui | M. Aliouat
[1] Emiliano De Cristofaro,et al. FAIR: fuzzy-based aggregation providing in-network resilience for real-time wireless sensor networks , 2009, WiSec '09.
[2] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[3] Marcelo Dias de Amorim,et al. Securing wireless sensor networks against aggregator compromises , 2008, IEEE Communications Magazine.
[4] Paul Rabinovich,et al. Secure Aggregation in Sensor Networks Using Neighborhood Watch , 2007, 2007 IEEE International Conference on Communications.
[5] Josep Domingo-Ferrer,et al. A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.
[6] Richard Han,et al. FireWxNet: a multi-tiered portable wireless system for monitoring weather conditions in wildland fire environments , 2006, MobiSys '06.
[7] Suat Ozdemir,et al. Concealed Data Aggregation in Heterogeneous Sensor Networks using Privacy Homomorphism , 2007, IEEE International Conference on Pervasive Services.
[8] Sandip Sen,et al. Robust Trust Mechanisms for Monitoring Aggregator Nodes in Sensor Networks , 2008 .
[9] Deborah Estrin,et al. A wireless sensor network For structural monitoring , 2004, SenSys '04.
[10] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[11] S. Shankar Sastry,et al. A Fine-Grained Taxonomy of Security Vulnerability in Active Network Environments , 2004, ICCSA.
[12] Yunghsiang Sam Han,et al. A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[13] Hans Eberle,et al. Energy Analysis of Public-Key Cryptography on Small Wireless Devices , 2004 .
[14] Pramod K. Varshney,et al. Data-aggregation techniques in sensor networks: a survey , 2006, IEEE Communications Surveys & Tutorials.
[15] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[16] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[17] Theodore S. Rappaport,et al. SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[18] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[19] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[20] Shivakant Mishra,et al. Security support for in-network processing in Wireless Sensor Networks , 2003, SASN '03.
[21] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[22] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[23] Jörg Widmer,et al. In-network aggregation techniques for wireless sensor networks: a survey , 2007, IEEE Wireless Communications.
[24] Partha Mukherjee. Detecting Malicious Sensor Nodes from Learned data Patterns , 2007 .
[25] H. Cam,et al. SRDA: secure reference-based data aggregation protocol for wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[26] Juan Manuel González Nieto,et al. RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[27] H. Cam,et al. Energy efficient security protocol for wireless sensor networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[28] Claude Castelluccia,et al. Securing Very Dynamic Groups and Data Aggregation in Wireless Sensor Networks , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.
[29] B SrivastavaMani,et al. Reputation-based framework for high integrity sensor networks , 2008 .
[30] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[31] Wang Jun,et al. Dynamic Hierarchical Distributed Intrusion Detection System Based on Multi-Agent System , 2006, 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology Workshops.
[32] John Anderson,et al. Wireless sensor networks for habitat monitoring , 2002, WSNA '02.
[33] Suat Özdemir,et al. Secure and Reliable Data Aggregation for Wireless Sensor Networks , 2007, UCS.
[34] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[35] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[36] K.J.R. Liu,et al. Attacks on Trust Evaluation in Distributed Networks , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[37] Audun Jøsang,et al. A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[38] Edoardo S. Biagioni,et al. The Application of Remote Sensor Technology To Assist the Recovery of Rare and Endangered Species , 2002, Int. J. High Perform. Comput. Appl..
[39] Adi Shamir,et al. How to share a secret , 1979, CACM.
[40] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[41] Kay Römer,et al. Medium access control issues in sensor networks , 2006, CCRV.
[42] Georgios Kambourakis,et al. Securing Medical Sensor Environments: The CodeBlue Framework Case , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[43] A. Zomaya,et al. A security framework for wireless sensor networks , 2006, Proceedings of the 2006 IEEE Sensors Applications Symposium, 2006..
[44] Dirk Westhoff,et al. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[45] Wei Zhang,et al. A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[46] Alessandro Sorniotti,et al. Secure and Trusted in-network Data Processing in Wireless Sensor Networks: a Survey , 2007 .
[47] H. Cam,et al. ESPDA: Energy-efficient and Secure Pattern-based Data Aggregation for wireless sensor networks , 2003, Proceedings of IEEE Sensors 2003 (IEEE Cat. No.03CH37498).
[48] Kristofer S. J. Pister,et al. MEMS for distributed wireless sensor networks , 2002, 9th International Conference on Electronics, Circuits and Systems.
[49] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .