Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks: A Survey
暂无分享,去创建一个
[1] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[2] K. Nahrstedt,et al. iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[3] Andreas Willig,et al. A short survey of wireless sensor networks , 2003 .
[4] Qi Wang,et al. On the privacy preserving properties of random data perturbation techniques , 2003, Third IEEE International Conference on Data Mining.
[5] Rabindra Bista,et al. A New Approach for Energy-Balanced Data Aggregation in Wireless Sensor Networks , 2009, 2009 Ninth IEEE International Conference on Computer and Information Technology.
[6] Wei Hong,et al. Proceedings of the 5th Symposium on Operating Systems Design and Implementation Tag: a Tiny Aggregation Service for Ad-hoc Sensor Networks , 2022 .
[7] Gelareh Taban,et al. Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks , 2009, 2009 International Conference on Computational Science and Engineering.
[8] Hakan Hacigümüs,et al. Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.
[9] Kay Römer,et al. Programming Paradigms and Middleware for Sensor Networks , 2004 .
[10] Sajal K. Das,et al. Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.
[11] Srinivasan Seshan,et al. Cache-and-query for wide area sensor databases , 2003, SIGMOD '03.
[12] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[13] Xue Liu,et al. PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[14] Deborah Estrin,et al. Impact of network density on data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[15] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[16] Wensheng Zhang,et al. GP^2S: Generic Privacy-Preservation Solutions for Approximate Aggregation of Sensor Data (concise contribution) , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[17] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[18] Dirk Westhoff,et al. CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[19] Jeffrey Considine,et al. Approximate aggregation techniques for sensor databases , 2004, Proceedings. 20th International Conference on Data Engineering.
[20] Arijit Ukil. Privacy Preserving Data Aggregation in Wireless Sensor Networks , 2010, 2010 6th International Conference on Wireless and Mobile Communications.
[21] H. S. Wolff,et al. iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.
[22] Josep Domingo-Ferrer,et al. A Provably Secure Additive and Multiplicative Privacy Homomorphism , 2002, ISC.
[23] Yehuda Lindell,et al. Privacy Preserving Data Mining , 2002, Journal of Cryptology.
[24] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[25] Bo Sheng,et al. Verifiable Privacy-Preserving Range Query in Two-Tiered Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[26] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[27] Ravi Kumar,et al. Sampling algorithms: lower bounds and applications , 2001, STOC '01.
[28] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.
[29] Gene Tsudik,et al. A Privacy-Preserving Index for Range Queries , 2004, VLDB.
[30] Guangjun Wen,et al. Protecting Classification Privacy Data Aggregation in Wireless Sensor Networks , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[31] Sushil Jajodia,et al. Privacy-preserving robust data aggregation in wireless sensor networks , 2009, Secur. Commun. Networks.
[32] Qi Han,et al. QUASAR: quality aware sensing architecture , 2004, SGMD.
[33] Sencun Zhu,et al. pDCS: Security and Privacy Support for Data-Centric Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[34] Thomas F. La Porta,et al. SET: Detecting node clones in sensor networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[35] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[36] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[37] Katia Obraczka,et al. The impact of timing in data aggregation for sensor networks , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[38] Davide Brunelli,et al. Wireless Sensor Networks , 2012, Lecture Notes in Computer Science.
[39] Pramod K. Varshney,et al. QoS Support in Wireless Sensor Networks: A Survey , 2004, International Conference on Wireless Networks.
[40] Jianliang Xu,et al. Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[41] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.