Computer Science ›› 2023, Vol. 50 ›› Issue (8): 333-341.doi: 10.11896/jsjkx.220800089
• Information Security • Previous Articles Next Articles
GAO Guangyong1,2,3, HAN Tingting1,3, XIA Zhihua4
CLC Number:
[1]JAN S R U,KHAN R,JAN M A.An energy-efficient data aggregation approach for cluster-based wireless sensor networks[J].Annals of Telecommunications,2021,76(5):321-329. [2]MANDEEP K,AMIT M.Data aggregation algorithms for wireless sensor network:A review[J].Ad Hoc Networks,2020,100(3):102083. [3]SANKARALINGAM S K,NARMADHA A S.Energy aware decision stump linear programming boosting node classification based data aggregation in WSN[J].Computer Communications,2020,155:133-142. [4]ADAM M S,ANIST M H,ALI I.Object tracking sensor networks in smart cities:Taxonomy,architecture,applications,research challenges and future directions[J].Future Generation Computer Systems,2020,107:909-923. [5]GOMATHI S,GOPALA K C.Malicious node detection in wireless sensor networks using an efficient secure data aggregation protocol[J].Wireless Personal Communications,2020,113(4):1775-1790. [6]ADNAN M,YANG L,AHMAD T,et al.An unequally clus-tered multi-hop routing protocol based on fuzzy logic for wireless sensor networks[J].IEEE Access,2021,9:38531-38545. [7]JURADO-LASSO F F,CLARKE K,CADAVID A N,et al.Energy-aware routing for software-defined multihop wireless sensor networks[J].IEEE Sensors Journal,2021,21(8):10174-10182. [8]LIU X,YU J,LI F,et al.Data aggregation in wireless sensor networks:from the perspective of security[J].IEEE Internet of Things Journal,2019,7(7):6495-6513. [9]RAWAT P,CHAUHAN S.A Novel Cluster Head Selection and Data Aggregation Protocol for Heterogeneous Wireless Sensor Network[J].Arabian Journal for Science and Engineering,2022,47:1971-1986. [10]ZHANG J,HU P,XIE F,et al.An energy efficient and reliable in-network data aggregation scheme for WSN[J].IEEE Access,2018,6:71857-71870. [11]HE W,LIU X,NGUYEN H,et al.PDA:Privacy-preservingdata aggregation in wireless sensor networks[C]//26th IEEE International Conference on Computer Communications(IEEE INFOCOM 2007).IEEE,2007:2045-2053. [12]HE W,LIU X,NGUYEN H V,et al.PDA:privacy-preserving data aggregation for information collection[J].ACM Transactions on Sensor Networks(TOSN),2011,8(1):1-22. [13]FANG W,WEN X Z,XU J,et al.CSDA:a novel cluster-based secure data aggregation scheme for WSNs[J].Cluster Computing,2019,22(3):5233-5244. [14]HUA P,LIU X,YU J,et al.Energy-efficient adaptive slice-based secure data aggregation scheme in WSN[J].Procedia Computer Science,2018,129:188-193. [15]ZHANG X,LIU X,YU J,et al.Energy-efficient privacy preserving data aggregation protocols based on slicing[C]//2019 International Conference on Internet of Things(iThings) and IEEE Green Computing and Communications(GreenCom) and IEEE Cyber,Physical and Social Computing(CPSCom) and IEEE Smart Data(SmartData).IEEE,2019:546-551. [16]ZHOU L,GE C,HU S,et al.Energy-efficient and privacy-preserving data aggregation algorithm for wireless sensor networks[J].IEEE Internet of Things Journal,2019,7(5):3948-3957. [17]HE W,LIU X,NGUYEN H,et al.A cluster-based protocol to enforce integrity and preserve privacy in data aggregation[C]//2009 29th IEEE International Conference on Distributed Computing Systems Workshops.IEEE,2009:14-19. [18]WANG T,QIN X,DING Y,et al.Privacy-preserving and energy-efficient continuous data aggregation algorithm in wireless sensor networks[J].Wireless Personal Communications,2018,98(1):665-684. [19]NELS S N,SINGH J.Security-aware authorization and verification based data aggregation model for wireless sensor networks[J].International Journal of Numerical Modelling:Electronic Networks,Devices and Fields,2021,34(3):e2844. [20]CHEN C M,LIN Y H,LIN Y C,et al.RCDA:Recoverable concealed data aggregation for data integrity in wireless sensor networks[J].IEEE Transactions on parallel and distributed systems,2011,23(4):727-734. [21]YANG L,DING C,WU M.RPIDA:Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks[J].KSII Transactions on Internet and Information Systems(TIIS),2015,9(12):5189-5208. [22]SHEN L,MA J,LIU X,et al.A secure and efficient id-based aggregate signature scheme for wireless sensor networks[J].IEEE Internet of Things Journal,2016,4(2):546-554. [23] MIN W,RUIXIANG C,SHUNBIN H.A Secure Data Aggregation Approach in Hierarchical Wireless Sensor Networks[C]//the 10th International Conference.ACM,2016:1-7. [24]ANITA D D,ROSLIN S E.Data validation and integrity verifi-cation for trust based data aggregation protocol in WSN[J].Microprocessors and Microsystems,2021,80(1):1-6. [25]KUMAR S,SINGH B K,PUNDIR S,et al.Role of Digital Watermarking in Wireless Sensor Network[J].Recent Advances in Computer Science and Communications(Formerly:Recent Patents on Computer Science),2022,15(2):215-228. [26]WAZIRALI R,AHMAD R,AL-AMAYREH A,et al.Securewatermarking schemes and their approaches in the iot technology:an overview[J].Electronics,2021,10(14):1744. [27]SHI X,XIAO D.A reversible watermarking authenticationscheme for wireless sensor networks[J].Information Sciences,2013,240:173-183. [28]ALROMIH A,AL-RODHAAN M,TIAN Y.A RandomizedWatermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications[J].Sensors,2018,18(12):4346. [29]JIANG W X,ZHANG Z X,WU J J.Reversible digital water-marking-based protocol for data integrity in wireless sensor network[J].Journal of Communication,2018,39(3):118-127. [30]QING L,ZHU Q X,WANG M W.Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks[J].Computer Communications,2006,29(12):2230-2237. |
[1] | LU Xingyuan, CHEN Jingwei, FENG Yong, WU Wenyuan. Privacy-preserving Data Classification Protocol Based on Homomorphic Encryption [J]. Computer Science, 2023, 50(8): 321-332. |
[2] | ZHAO Min, TIAN Youliang, XIONG Jinbo, BI Renwan, XIE Hongtao. Neural Network Model Training Method Based on Homomorphic Encryption [J]. Computer Science, 2023, 50(5): 372-381. |
[3] | Yifei ZOU, Senmao QI, Cong'an XU, Dongxiao YU. Distributed Weighted Data Aggregation Algorithm in End-to-Edge Communication Networks Based on Multi-armed Bandit [J]. Computer Science, 2023, 50(2): 13-22. |
[4] | LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325. |
[5] | QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346. |
[6] | REN Hua, NIU Shao-zhang, WANG Mao-sen, YUE Zhen, REN Ru-yong. Homomorphic and Commutative Fragile Zero-watermarking Based on SVD [J]. Computer Science, 2022, 49(3): 70-76. |
[7] | LYU You, WU Wen-yuan. Linear System Solving Scheme Based on Homomorphic Encryption [J]. Computer Science, 2022, 49(3): 338-345. |
[8] | YANG Hong-jian, HU Xue-xian, LI Ke-jia, XU Yang, WEI Jiang-hong. Study on Privacy-preserving Nonlinear Federated Support Vector Machines [J]. Computer Science, 2022, 49(12): 22-32. |
[9] | GUO Yan-qing, LI Yu-hang, WANG Wan-wan, FU Hai-yan, WU Ming-kan, LI Yi. FL-GRM:Gamma Regression Algorithm Based on Federated Learning [J]. Computer Science, 2022, 49(12): 66-73. |
[10] | ZHU Zong-wu, HUANG Ru-wei. Secure Multi-party Computing Protocol Based on Efficient Fully Homomorphic Encryption [J]. Computer Science, 2022, 49(11): 345-350. |
[11] | ZHOU Qian, DAI Hua, SHENG Wen-jie, HU Zheng, YANG Geng. Research on Verifiable Keyword Search over Encrypted Cloud Data:A Survey [J]. Computer Science, 2022, 49(10): 272-278. |
[12] | ZHANG Xiao-yan, LI Qin-wei, FU Fu-jie. Secret Verification Method of Blockchain Transaction Amount Based on Digital Commitment [J]. Computer Science, 2021, 48(9): 324-329. |
[13] | ZHOU Yi-hua, JIA Yu-xin, JIA Li-yuan, FANG Jia-bo, SHI Wei-min. Data Integrity Verification Scheme of Shared EMR Based on Red Black Tree [J]. Computer Science, 2021, 48(9): 330-336. |
[14] | WANG Rui-jin, TANG Yu-cheng, PEI Xi-kai, GUO Shang-tong, ZHANG Feng-li. Block-chain Privacy Protection Scheme Based on Lightweight Homomorphic Encryption and Zero-knowledge Proof [J]. Computer Science, 2021, 48(11A): 547-551. |
[15] | XU Kun, FU Yin-jin, CHEN Wei-wei, ZHANG Ya-nan. Research Progress on Blockchain-based Cloud Storage Security Mechanism [J]. Computer Science, 2021, 48(11): 102-115. |
|