Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Establishing pairwise keys in distributed sensor networks
ACM Transactions on Information and System Security (TISSEC)
A Survey on Data Compression in Wireless Sensor Networks
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
An architecture for distributed wavelet analysis and processing in sensor networks
Proceedings of the 5th international conference on Information processing in sensor networks
Energy-optimized image communication on resource-constrained sensor platforms
Proceedings of the 6th international conference on Information processing in sensor networks
IEEE Transactions on Computers
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Proactive code verification protocol in wireless sensor network
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Hi-index | 0.00 |
Delay Tolerant Wireless Sensor Networks (DTWSNs) are sensor networks where continuous connectivity between the sensor nodes and their final destinations (e.g., the base station) cannot be guaranteed. Storage constraints are particularly a concern in DTWSNs, since each node may have to store sensed data for a long period of time due to intermittent communication while continuously collecting data. In this paper, we develop novel techniques to seamlessly authenticate and compress sensed data, addressing the storage concerns in DTWSNs in hostile environments by harnessing both temporal and spatial correlation among sensed data. By appropriately using Message Authentication Code (MAC) and one-way hash functions, our techniques allow a node (including intermediate, non-source nodes) to efficiently compress sensed data without regenerating MACs. We explore the trade-off between data distortion and storage reduction provided by compression so that we can reach the maximum data reduction while maintaining desired data quality.