Secure and energy-efficient data aggregation in Wireless Sensor Networks
暂无分享,去创建一个
[1] Jaydip Sen,et al. A distributed protocol for detection of packet dropping attack in mobile ad hoc networks , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.
[2] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[3] Jaydip Sen. A Trust-Based Detection Algorithm of Selfish Packet Dropping Nodes in a Peer-to-Peer Wireless Mesh Network , 2010, CNSA.
[4] Jaydip Sen. A Distributed Trust and Reputation Framework for Mobile Ad Hoc Networks , 2010, CNSA.
[5] Gene Tsudik,et al. QUEST Software and , 2022 .
[6] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[7] Hasan Çam,et al. Energy-efficient secure pattern based data aggregation for wireless sensor networks , 2006, Comput. Commun..
[8] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[9] Dirk Westhoff,et al. Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.
[10] Jaydip Sen,et al. A Robust and Secure Aggregation Protocol for Wireless Sensor Networks , 2011, 2011 Sixth IEEE International Symposium on Electronic Design, Test and Application.
[11] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[12] Caroline Fontaine,et al. A Survey of Homomorphic Encryption for Nonspecialists , 2007, EURASIP J. Inf. Secur..
[13] Jaydip Sen,et al. A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..
[14] Suat Ozdemir,et al. Secure and reliable data aggregation for wireless sensor networks , 2007 .
[15] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[16] Yang Xiao,et al. Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2007, Ad Hoc Networks.
[17] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[18] Dirk Westhoff,et al. A Survey on the Encryption of Convergecast Traffic with In-Network Processing , 2010, IEEE Transactions on Dependable and Secure Computing.
[19] Dirk Westhoff,et al. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[20] Jaydip Sen,et al. Reputation- and Trust-Based Systems for Wireless Self-organizing Networks , 2011, ArXiv.
[21] Frederik Armknecht,et al. A lifetime-optimized end-to-end encryption scheme for sensor networks allowing in-network processing , 2008, Comput. Commun..
[22] Dirk Westhoff,et al. Secure comparison of encrypted data in wireless sensor networks , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).