Improving Data Confidentiality and Integrity for Data Aggregation in Wireless Sensor Networks
暂无分享,去创建一个
Rabindra Bista | Jae-Woo Chang | Yong-Ki Kim | Myoung-Seon Song | Yong-Ki Kim | Rabindra Bista | Jae-Woo Chang | Myoung-Seon Song
[1] Gustavus J. Simmons,et al. An Introduction to Shared Secret and/or Shared Control Schemes and Their ApplicationThis work was performed at Sandia National Laboratories and supported by the U.S. Department of Energy under contract number DEAC0476DPOO789. , 1992 .
[2] K. Nahrstedt,et al. iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[3] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[4] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[5] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[6] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[7] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[8] Rabindra Bista,et al. A New Approach for Energy-Balanced Data Aggregation in Wireless Sensor Networks , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.
[9] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[10] Martina Zitterbart,et al. An efficient key establishment scheme for secure aggregating sensor networks , 2006, ASIACCS '06.
[11] Wensheng Zhang,et al. Confidentiality Protection for Distributed Sensor Data Aggregation , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[12] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[13] Hung-Min Sun,et al. Constructing Perfect Secret Sharing Schemes for General and Uniform Access Structures , 1999, J. Inf. Sci. Eng..
[14] Salah A. Aly,et al. Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks , 2008, IEEE INFOCOM Workshops 2008.
[15] David E. Culler,et al. System architecture directions for networked sensors , 2000, SIGP.
[16] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[17] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[18] Sushil Jajodia,et al. Privacy-preserving robust data aggregation in wireless sensor networks , 2009, Secur. Commun. Networks.
[19] Xue Liu,et al. A Cluster-Based Protocol to Enforce Integrity and Preserve Privacy in Data Aggregation , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.
[20] Jeffrey Considine,et al. Approximate aggregation techniques for sensor databases , 2004, Proceedings. 20th International Conference on Data Engineering.
[21] Wei Hong,et al. TinyDB: an acquisitional query processing system for sensor networks , 2005, TODS.
[22] Kotagiri Ramamohanarao,et al. Inverted files versus signature files for text indexing , 1998, TODS.
[23] Robert Szewczyk,et al. System architecture directions for networked sensors , 2000, ASPLOS IX.