Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact
暂无分享,去创建一个
Sushil Jajodia | Mauro Conti | Sanjeev Setia | Sankardas Roy | S. Jajodia | Sankardas Roy | M. Conti | Sanjeev Setia
[1] Deborah Estrin,et al. Embedded Imagers: Detecting, Localizing, and Recognizing Objects and Events in Natural Habitats , 2010, Proceedings of the IEEE.
[2] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[3] Haifeng Yu. Secure and highly-available aggregation queries in large-scale sensor networks via set sampling , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[4] Sushil Jajodia,et al. Attack-resilient hierarchical data aggregation in sensor networks , 2006, SASN '06.
[5] Haifeng Yu,et al. Secure and highly-available aggregation queries in large-scale sensor networks via set sampling , 2009, 2009 International Conference on Information Processing in Sensor Networks.
[6] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[7] Levente Buttyán,et al. Resilient aggregation with attack detection in sensor networks , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[8] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[9] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[10] Keith B. Frikken,et al. An efficient integrity-preserving scheme for hierarchical sensor aggregation , 2008, WiSec '08.
[11] Peter I. Corke,et al. Environmental Wireless Sensor Networks , 2010, Proceedings of the IEEE.
[12] Suman Nath,et al. Secure outsourced aggregation via one-way chains , 2009, SIGMOD Conference.
[13] Philippe Flajolet,et al. Probabilistic Counting Algorithms for Data Base Applications , 1985, J. Comput. Syst. Sci..
[14] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[15] Mingyan Liu,et al. Special issue on sensor network applications , 2010, Proc. IEEE.
[16] Sushil Jajodia,et al. Secure Data Aggregation in Wireless Sensor Networks , 2008 .
[17] Binbin Chen,et al. Secure Aggregation with Malicious Node Revocation in Sensor Networks , 2011, 2011 31st International Conference on Distributed Computing Systems.
[18] Sanjeev Khanna,et al. Power-conserving computation of order-statistics over sensor networks , 2004, PODS '04.
[19] Srinivasan Seshan,et al. Synopsis diffusion for robust aggregation in sensor networks , 2004, SenSys '04.
[20] Jeffrey Considine,et al. Approximate aggregation techniques for sensor databases , 2004, Proceedings. 20th International Conference on Data Engineering.
[21] Deborah Estrin,et al. Computing aggregates for monitoring wireless sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[22] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[23] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[24] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[25] Joseph M. Hellerstein,et al. Proof Sketches: Verifiable In-Network Aggregation , 2007, 2007 IEEE 23rd International Conference on Data Engineering.