The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Password authentication with insecure communication
Communications of the ACM
System architecture directions for networked sensors
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
PSFQ: a reliable transport protocol for wireless sensor networks
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
SPINS: security protocols for sensor networks
Wireless Networks
Keying Hash Functions for Message Authentication
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Secure Aggregation for Wireless Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Computation hierarchy for in-network processing
WSNA '03 Proceedings of the 2nd ACM international conference on Wireless sensor networks and applications
SIA: secure information aggregation in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems
Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems
Time-diffusion synchronization protocol for wireless sensor networks
IEEE/ACM Transactions on Networking (TON)
pDCS: Security and Privacy Support for Data-Centric Sensor Networks
IEEE Transactions on Mobile Computing
Forward secure communication in wireless sensor networks
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
IEEE Communications Magazine
Hi-index | 0.00 |
Tiered wireless sensor networks (WSNs) have many advantages over traditional WSNs. However, they are vulnerable to security attacks, especially the attacks to the storage nodes that buffer and process the data readings from sensors. In this paper, we propose a secure data collection protocol SDC to support time-based queries in tiered WSNs. With small overhead introduced to data communication, SDC protects both data confidentiality and data integrity. In particular it employs data co-commitment scheme such that it can detect the seriousness of data losing and estimate the value of lost data in the network.