Confidentiality and Integrity for Data Aggregation in WSN Using Homomorphic Encryption
暂无分享,去创建一个
Habib Youssef | Abdelbasset Trad | Soufiene Ben Othman | Abdullah Ali Bahattab | H. Youssef | S. Othman | A. Trad | A. Bahattab
[1] Alfred Menezes,et al. Guide to Elliptic Curve Cryptography , 2004, Springer Professional Computing.
[2] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[3] Takahiro Hara,et al. Wireless Sensor Network Technologies for the Information Explosion Era , 2012, Wireless Sensor Network Technologies for the Information Explosion Era.
[4] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[5] Haifeng Yu,et al. Secure and highly-available aggregation queries in large-scale sensor networks via set sampling , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[6] Nitin Gupta,et al. Wireless Sensor Network: A Review on Data Aggregation , 2011 .
[7] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[8] Tatsuaki Okamoto,et al. EPOC: Efficient Probabilistic Public-Key Encryption (Submission to P1363a) , 1998 .
[9] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.
[10] Josep Domingo-Ferrer,et al. A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.
[11] Guang Gong,et al. On Data Aggregation with Secure Bloom Filter in Wireless Sensor Networks , 2010 .
[12] R. B. Patel,et al. EIRDA: An Energy Efficient Interest based Reliable Data Aggregation Protocol for Wireless Sensor Networks , 2011 .
[13] Hasan Çam,et al. Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks , 2010, IEEE/ACM Transactions on Networking.
[14] Xiaodong Lin,et al. MDPA: multidimensional privacy-preserving aggregation scheme for wireless sensor networks , 2010, CMC 2010.
[15] Theodore S. Rappaport,et al. SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[16] Issa M. Khalil,et al. SECOS : Key Management for Scalable and Energy Efficient Crypto On Sensors , 2003 .
[17] Mani Srivastava,et al. Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..
[18] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[19] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[20] Yang Xiao,et al. Intrusion detection techniques in mobile ad hoc and wireless sensor networks , 2007, IEEE Wireless Communications.
[21] Guojun Wang,et al. Energy Efficient Data Aggregation Scheduling in Wireless Sensor Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[22] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[23] Symeon Papavassiliou,et al. Energy-efficient framework for data gathering in wireless sensor networks via the combination of sleeping MAC and data aggregation strategies , 2011, Int. J. Sens. Networks.
[24] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[25] K. Pradeepa,et al. Design and Implementation Issues of Clustering in Wireless Sensor Networks , 2012 .
[26] Keqiu Li,et al. Energy-efficient and high-accuracy secure data aggregation in wireless sensor networks , 2011, Comput. Commun..
[27] Yong Wang,et al. A survey of security issues in wireless sensor networks , 2006, IEEE Communications Surveys & Tutorials.
[28] Shiuh-Pyng Shieh,et al. Secure encrypted-data aggregation for wireless sensor networks , 2010, Wirel. Networks.
[29] Tanbhir Hoq,et al. Micro hydro power: promising solution for off-grid renewable energy source , 2011 .
[30] Joonsang Baek,et al. Efficient online/offline identity-based signature for wireless sensor network , 2010, International Journal of Information Security.
[31] Georg Carle,et al. Applications of Wireless Sensor Networks , 2010 .
[32] V. D. Mytri,et al. A Reliable Data Aggregation Forwarding Protocol for Wireless Sensor Networks , 2012 .
[33] Dirk Westhoff,et al. A Survey on the Encryption of Convergecast Traffic with In-Network Processing , 2010, IEEE Transactions on Dependable and Secure Computing.
[34] Neha Singh,et al. Energy Efficient Techniques for Data aggregation and collection in WSN , 2012 .
[35] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[36] V. D. Mytri,et al. An Adaptive Energy Efficient Forwarding Data Aggregation and QoS Protocol for Wireless Sensor Networks , 2012 .
[37] Ahmad Alkhatib,et al. Wireless Sensor Network- An Advanced Survey , 2013 .
[38] Shaojie Tang,et al. A Delay-Efficient Algorithm for Data Aggregation in Multihop Wireless Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.
[39] Ameer Ahmed Abbasi,et al. A survey on clustering algorithms for wireless sensor networks , 2007, Comput. Commun..
[40] Yu-Chee Tseng,et al. Wireless sensor networks , 2008 .
[41] Lalit M. Patnaik,et al. Secure Data Aggregation Using Clusters in Sensor Networks , 2009 .
[42] Gene Tsudik,et al. QUEST Software and , 2022 .
[43] Jacques M. Bahi,et al. Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks , 2010, 2010 Fourth International Conference on Sensor Technologies and Applications.
[44] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.