• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

DMCA

SIA: Secure Information Aggregation in Sensor Networks (2003)

Cached

  • Download as a PDF

Download Links

  • [www.ece.cmu.edu]
  • [www.cs.sunysb.edu]
  • [cs.ucsb.edu]
  • [www.ece.cmu.edu]
  • [sparrow.ece.cmu.edu]
  • [sparrow.ece.cmu.edu]
  • [www.cs.sunysb.edu]
  • [users.ece.cmu.edu]
  • [users.ece.cmu.edu]
  • [www.cs.berkeley.edu]
  • [sparrow.ece.cmu.edu]
  • [www.gta.ufrj.br]
  • [web.eecs.umich.edu]
  • [suraj.lums.edu.pk]
  • [web.eecs.umich.edu]
  • [users.ece.cmu.edu]
  • [users.ece.cmu.edu]
  • [users.ece.cmu.edu]
  • [suraj.lums.edu.pk]
  • [web.eecs.umich.edu]
  • [web.eecs.umich.edu]
  • [wwwcsif.cs.ucdavis.edu]
  • [nas.uhcl.edu]
  • [sce.uhcl.edu]
  • [sce.uhcl.edu]
  • [nas.uhcl.edu]
  • [sce.uhcl.edu]
  • [nas.uhcl.edu]
  • [sce.uhcl.edu]
  • [nas.uhcl.edu]
  • [nas.uhcl.edu]
  • [sce.uhcl.edu]
  • [nas.uhcl.edu]
  • [sce.uhcl.edu]
  • [www.cs.trinity.edu]
  • [www.cs.virginia.edu]
  • [www.cens.ucla.edu]

  • Other Repositories/Bibliography

  • DBLP
  • Save to List
  • Add to Collection
  • Correct Errors
  • Monitor Changes
by Bartosz Przydatek , Dawn Song , Adrian Perrig
Citations:253 - 13 self
  • Summary
  • Citations
  • Active Bibliography
  • Co-citation
  • Clustered Documents
  • Version History

BibTeX

@INPROCEEDINGS{Przydatek03sia:secure,
    author = {Bartosz Przydatek and Dawn Song and Adrian Perrig},
    title = {SIA: Secure Information Aggregation in Sensor Networks},
    booktitle = {},
    year = {2003},
    pages = {255--265},
    publisher = {ACM Press}
}

Share

Facebook Twitter Reddit Bibsonomy

OpenURL

 

Abstract

Sensor networks promise viable solutions to many monitoring problems. However, the practical deployment of sensor networks faces many challenges imposed by real-world demands. Sensor nodes often have limited computation and communication resources and battery power. Moreover, in many applications sensors are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the sensor's cryptographic keys. One of the basic and indispensable functionalities of sensor networks is the ability to answer queries over the data acquired by the sensors. The resource constraints and security issues make designing mechanisms for information aggregation in large sensor networks particularly challenging.

Keyphrases

sensor network    secure information aggregation    physical attack    open environment    battery power    sensor node    viable solution    many application sensor    indispensable functionality    communication resource    many monitoring problem    many challenge    cryptographic key    large sensor network    real-world demand    practical deployment    information aggregation    resource constraint    security issue   

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University