GloMoSim: a library for parallel simulation of large-scale wireless networks
PADS '98 Proceedings of the twelfth workshop on Parallel and distributed simulation
A Provably Secure Additive and Multiplicative Privacy Homomorphism
ISC '02 Proceedings of the 5th International Conference on Information Security
Application-specific protocol architectures for wireless networks
Application-specific protocol architectures for wireless networks
Order preserving encryption for numeric data
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Security considerations for IEEE 802.15.4 networks
Proceedings of the 3rd ACM workshop on Wireless security
Secure Comparison of Encrypted Data in Wireless Sensor Networks
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
TAG: a Tiny AGgregation service for Ad-Hoc sensor networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Protocols and Architectures for Wireless Sensor Networks
Protocols and Architectures for Wireless Sensor Networks
E.cient Aggregation of encrypted data in Wireless Sensor Networks
MOBIQUITOUS '05 Proceedings of the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
IEEE Transactions on Mobile Computing
Collaborative storage management in sensor networks
International Journal of Ad Hoc and Ubiquitous Computing
Beyond average: toward sophisticated sensing with queries
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Body sensor network security: an identity-based cryptography approach
WiSec '08 Proceedings of the first ACM conference on Wireless network security
A secure and resilient WSN roadside architecture for intelligent transport systems
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Secure hierarchical data aggregation in wireless sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
MSS: a multi-level data placement scheme for data survival in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Design of large-scale agricultural wireless sensor networks: email from the vineyard
International Journal of Sensor Networks
Efficient fine-grained data access control in wireless sensor networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
ACM Transactions on Sensor Networks (TOSN)
Ensuring data storage security against frequency-based attacks in wireless networks
DCOSS'10 Proceedings of the 6th IEEE international conference on Distributed Computing in Sensor Systems
Re-visited: denial of service resilient access control for wireless sensor networks
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
tinyLUNAR: one-byte multihop communications through hybrid routing in wireless sensor networks
NEW2AN'07 Proceedings of the 7th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking
Hi-index | 0.00 |
In wireless sensor networks there is a need to securely store monitored data in a distributed way whenever it is either not desired or simply not possible to transmit regional volatile information to an authorised recipient in real-time. In particular, for wireless sensor network applications with an asynchronous character, the wireless sensor network itself needs to store the monitored data. Since nodes may disappear over time, a replicated and read-protected, but yet space- and energy-efficient, data storage is mandatory. In this work we provide and analyse an approach for a tiny Persistent Encrypted Data Storage (tinyPEDS) of the environmental fingerprint for asynchronous wireless sensor networks. Even if parts of the network are exhausted, restoring rules ensure that, with a high probability, environmental information from past is still available.