Secure data aggregation in wireless sensor networks using homomorphic encryption
暂无分享,去创建一个
[1] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[2] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[3] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[4] Suat Ozdemir,et al. Concealed Data Aggregation in Heterogeneous Sensor Networks using Privacy Homomorphism , 2007, IEEE International Conference on Pervasive Services.
[5] Yunghsiang Sam Han,et al. A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[6] Dirk Westhoff,et al. A Survey on the Encryption of Convergecast Traffic with In-Network Processing , 2010, IEEE Transactions on Dependable and Secure Computing.
[7] Yang Xiao,et al. Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[8] Hasan Çam,et al. Energy-efficient secure pattern based data aggregation for wireless sensor networks , 2006, Comput. Commun..
[9] Houston H. Carr,et al. Safe Wireless Practices , 2007, Inf. Syst. Manag..
[10] Josep Domingo-Ferrer,et al. A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.
[11] Charalampos Konstantopoulos,et al. Effective Determination of Mobile Agent Itineraries for Data Aggregation on Sensor Networks , 2010, IEEE Transactions on Knowledge and Data Engineering.
[12] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[13] Pramod K. Varshney,et al. Data-aggregation techniques in sensor networks: a survey , 2006, IEEE Communications Surveys & Tutorials.
[14] Hung-Min Sun,et al. CDAMA: Concealed Data Aggregation Scheme for Multiple Applications in Wireless Sensor Networks , 2013, IEEE Transactions on Knowledge and Data Engineering.
[15] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[16] Sajal K. Das,et al. Fast track article: Secure data aggregation in wireless sensor networks: A watermark based authentication supportive approach , 2008 .
[17] Min Chen,et al. Itinerary Planning for Energy-Efficient Agent Communications in Wireless Sensor Networks , 2011, IEEE Transactions on Vehicular Technology.
[18] H. Cam,et al. SRDA: secure reference-based data aggregation protocol for wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[19] Yang Zhang,et al. Secure Sensor Localization in Wireless Sensor Networks based on Neural Network , 2012, Int. J. Comput. Intell. Syst..
[20] S. Sharmila,et al. Node ID based detection of Sybil attack in mobile wireless sensor network , 2013 .
[21] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[22] Victor C. M. Leung,et al. Mobile Agent Based Wireless Sensor Networks , 2006, J. Comput..
[23] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[24] Suat Özdemir,et al. Secure and Reliable Data Aggregation for Wireless Sensor Networks , 2007, UCS.
[25] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[26] Dirk Westhoff,et al. Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.
[27] Sartaj Sahni,et al. Algorithms for Wireless Sensor Networks , 2005, Int. J. Distributed Sens. Networks.
[28] S. R. Vijayalakshmi,et al. Real-time monitoring of ubiquitous wireless ECG sensor node for medical care using ZigBee , 2012 .
[29] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.
[30] Agostino Poggi,et al. JADE: A software framework for developing multi-agent applications. Lessons learned , 2008, Inf. Softw. Technol..
[31] Theodore S. Rappaport,et al. SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..