Computer Science ›› 2016, Vol. 43 ›› Issue (Z6): 353-356.doi: 10.11896/j.issn.1002-137X.2016.6A.084
Previous Articles Next Articles
LIU Huai-jin, CHEN Yong-hong, TIAN Hui, WANG Tian and CAI Yi-qiao
[1] Ozdemir S,Xiao Y.Secure data aggregation in wireless sensor networks:A comprehensive overview[J].Computer Networks,2009,53(12):2022-2037 [2] Wang G,Cao J,Wang H,et al.Polynomial regression for data gathering in environmental monitoring applications[C]∥Global Telecommunications Conference,2007(GLOBECOM’07).IEEE,2007:1307-1311 [3] Madden S,Franklin M J,Hellerstein J M,et al.TAG:A tiny aggregation service for ad-hoc sensor networks[J].ACM SIGOPS Operating Systems Review,2002,36(SI):131-146 [4] He W,Liu X,Nguyen H,et al.Pda:Privacy-preserving data aggregation in wireless sensor networks[C]∥26th IEEE International Conference on Computer Communications INFOCOM 2007.IEEE,2007:2045-2053 [5] Westhoff D,Girao J,Acharya M.Concealed data aggregation for reverse multicast traffic in sensor networks:Encryption,key distribution,and routing adaptation[J].IEEE Transactions on Mobile Computing,2006,5(10):1417-1431 [6] Ozdemir S,Xiao Y.Polynomial regression based secure data aggregation for wireless sensor networks[C]∥2011 IEEE Global Telecommunications Conference (GLOBECOM 2011).IEEE,2011:1-5 [7] Bista R,Yoo H K,Chang J W.A new sensitive data aggregation scheme for protecting integrity in wireless sensor networks[C]∥2010 IEEE 10th International Conference on Computer and Information Technology (CIT).IEEE,2010:2463-2470 [8] 周强,杨庚,李森,等.一种可检测数据完整性的隐私数据融合算法[J].电子与信息学报,2013,35(6):1277-1283 [9] Seetharam D,Rhee S.An efficient pseudo random numbergenerator for low-power sensor networks [wireless networks[C]∥29th Annual IEEE International Conference on Local Computer Networks,2004.IEEE,2004:560-562 [10] Ozdemir S.Secure Load Balancing via Hierarchical Data Aggregation in Heterogeneous Sensor Networks[J].J.Inf.Sci.Eng.,2009,25(6):1691-1705 [11] He W,Liu X,Nguyen H,et al.A cluster-based protocol to enforce integrity and preserve privacy in data aggregation[C]∥29th IEEE International Conference on Distributed Computing Systems Workshops,2009(ICDCS Workshops’09).IEEE,2009:14-19 [12] Du W,Deng J,Han Y S,et al.A pairwise key predistributionscheme for wireless sensor networks[J].ACM Transactions on Information and System Security (TISSEC),2005,8(2):228-258 [13] Eschenauer L,Gligor V D.A key-management scheme for distributed sensor networks[C]∥Proceedings of the 9th ACM Conference on Computer and Communications Security.ACM,2002:41-47 [14] Heinzelman W R,Chandrakasan A,Balakrishnan H.Energy-efficient communication protocol for wireless microsensor networks[C]∥Proceedings of the 33rd annual Hawaii international conference on System sciences,2000.IEEE,2000:10 [15] Hu L,Evans D.Secure aggregation for wireless networks [C]∥2003 Symposium on Applications and the Internet Workshops,2003.IEEE,2003:384-391 [16] Mlaih E,Aly S.Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks[C]∥INFOCOM Workshops 2008.IEEE,2008:1-6 |
No related articles found! |
|