Abstract | ||
---|---|---|
Sensor networks are playing a more and more important role in monitoring problems such as surveillance and tracking moving objects. In-network processing has been shown to improve scalability, prolong sensor network lifetimes, and diminish computational demands. However, securely querying past data becomes a challenge. An unimportant event in the past could become interesting later; therefore, methods for securely placing a query on a past event should be available. This paper focuses on the challenges associated with securing queries on past data in a sensor network, and proposes methods for past data aggregation using in-network processing. Two different methods are proposed for securing queries on past data; both use forward secure cryptography and provide forward secure data authentication. We compare their security and performance, and also compare them with previous schemes. |
Year | DOI | Venue |
---|---|---|
2005 | 10.1109/PERSER.2005.1506392 | ICPS |
Keywords | Field | DocType |
forward secure cryptography,cryptography,monitoring,surveillance,in-network processing,forward secure data authentication,local data protection,wireless sensor networks,message authentication,data aggregation,query processing,forward security,capacitive sensors,intelligent networks,sensor network,computer science,data protection,computer networks,terrorism,base stations | Authentication,Message authentication code,Cryptography,Computer science,Computer network,Intelligent Network,Data Protection Act 1998,Wireless sensor network,Data aggregator,Scalability | Conference |
ISBN | Citations | PageRank |
0-7803-9032-6 | 1 | 0.38 |
References | Authors | |
23 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Yi Ouyang | 1 | 157 | 12.00 |
Zhengyi Le | 2 | 228 | 19.09 |
James Ford | 3 | 59 | 7.31 |
Fillia Makedon | 4 | 1676 | 201.73 |