Data Security in a Distributed Wireless Network System
Abstract
Keywords
Full Text:
PDFReferences
Shucheng Yu, Kui Ren Wenjing Lou, “FDAC: Toward Fine-grained Distributed Data Access Control in Wireless Sensor Networks”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, June, 2010.
S. Yu, K. Ren, and W. Lou, “FDAC: Toward Fine-Grained Distributed DataAccess Control in Wireless Sensor Networks,” Proc. IEEE INFOCOM, Apr. 2009.
Michal VARCHOLA, “Data Security in Wireless Sensor Networks– the Task for Public Key Cryptography”, Dept. of Electronics and Multimedia Communications, FEI TU of Koˇsice, Slovak Republic Miso.Varchola@tuke.sk
I.F. Akyildiz and I.H. Kasimoglu, “Wireless Sensor and Actor Networks: Research Challenges,” Ad Hoc Networks, vol. 2, no. 4, pp. 351-367, Oct. 2004.
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, pp. 102-116, Aug. 2002.
C.-Y. Chong and S.P. Kumar, “Sensor Networks: Evolution, Opportunities and Challenges,” Proc. IEEE, vol. 91, no. 8, pp. 1247-1256, Aug. 2003.
A. Cerpa, J. Elson, D. Estrin, L. Girod, M. Hamilton, and J. Zhao, “Habitat Monitoring: Application Driver for Wireless Communications Technology,” Proc. ACM SIGCOMM Workshop Data Comm. in Latin Am. and the Caribbean, Apr. 2001.
D. Estrin, D. Culler, and K. Pister, “Connecting the Physical World with Pervasive Networks,” IEEE Pervasive Computing, vol. 1, no. 1, pp. 59-69, Jan.-Mar. 2002.
B. Thuraisingham, “Secure Sensor Information Management and Mining,” IEEE Signal Processing Magazine, vol. 21, no. 3, pp. 14-19, May 2004.
A. Banerjee, A. Mitra, W. Najjar, D. Zeinalipour-Yazti, V. Kalogeraki, and D. Gunopulos, “RISE Co-S: High Performance Sensor Storage and Co-Processing Architecture,” Proc. Second Ann. IEEE Comm. Soc. Conf. Sensor and Ad Hoc Comm. and Networks (SECON ’05), 2005.
A. Mitra, A. Banerjee, W. Najjar, D. Zeinalipour-Yazti, V. Kalogeraki, and D.Gunopulos, “High-Performance Low Power Sensor Platforms Featuring Gigabyte Scale Storage,” Proc. Ann IEEE/ACM Int’l Conf. Mobile and Ubiquitous Systems: Networking and Service (MobiQuitous ’05), 2005.
G. Mathur, P. Desnoyers, D. Ganesan, and P. Shenoy, “Capsule: An Energy-Optimized Object Storage System for Memory-Constrained Sensor Devices,” Proc. ACM Conf. Embedded Networked Sensor Systems (Sensys), Nov. 2006.
D. Zeinalipour-Yazti, V. Kalogeraki, D. Gunopulos, A. Mitra, A. Banerjee, and W. Najjar, “Towards In-Situ Data Storage in Sensor Databases,” Proc. 10th Panhellenic Conf. Informatics (PCI ’05), pp. 36-46, 2005.
S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenker, “GHT: A Geographic Hash Table for Data-Centric Storage,” Proc. Int’l Workshop Wireless Sensor Networks and Applications (WSNA ’02), Sept. 2002.
J. Newsome and D. Song, “GEM:Graph Embedding for Routing and Data-Centric Storage in Sensor Networks without Geographic Information,” Proc. ACM Conf. Embedded Networked Sensor Systems (SenSys ’03), Nov. 2003.
J. Girao, D. Westhoff, E. Mykletun, and T. Araki, “Tinypeds: Tiny Persistent Encrypted Data Storage in Asynchronous Wireless Sensor Networks,” Ad Hoc Networks, vol. 5, no. 7, pp. 1073-1089, 2007.
R.D. Pietro, L.V. Mancini, C. Soriente, A. Spognardi, and G. Tsudik, “Catch Me (If You Can): Data Survival in Unattended Sensor Networks,” Proc. Sixth Ann. IEEE Int’l Conf. Pervasive Computing and Comm. (PerCom ’08), Mar. 2008.
Q. Wang, K. Ren, W. Lou, and Y. Zhang, “Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance,” Proc. IEEE INFOCOM, Apr. 2009.
Kui Ren, Wenjing Lou, Yanchao Zhang, “LEDS: Providing Location-aware End-to-end Data Security in Wireless Sensor Networks”, IEEE transactions 2006
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.