Secure Hierarchical Data Aggregation in Wireless Sensor Networks: Performance Evaluation and Analysis
暂无分享,去创建一个
[1] Roberto Di Pietro,et al. Confidentiality and integrity for data aggregation in WSN using peer monitoring , 2009, Secur. Commun. Networks.
[2] Hung-Min Sun,et al. An Efficient and Verifiable Concealed Data Aggregation Scheme in Wireless Sensor Networks , 2008, 2008 International Conference on Embedded Software and Systems.
[3] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[4] Deborah Estrin,et al. The impact of data aggregation in wireless sensor networks , 2002, Proceedings 22nd International Conference on Distributed Computing Systems Workshops.
[5] Dirk Westhoff,et al. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks , 2006, 2006 IEEE International Conference on Communications.
[6] Wenbo He,et al. KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks , 2011, 2011 Proceedings IEEE INFOCOM.
[7] S. Peter,et al. On Concealed Data Aggregation for Wireless Sensor Networks , 2006 .
[8] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[9] Sanjay Kumar Madria,et al. Practical algorithm for data security (PADS) in wireless sensor networks , 2007, MobiDE '07.
[10] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[11] Refik Molva,et al. Secure Data Aggregation with Multiple Encryption , 2007, EWSN.
[12] Jacques M. Bahi,et al. Efficient and Robust Secure Aggregation of Encrypted Data in Sensor Networks , 2010, 2010 Fourth International Conference on Sensor Technologies and Applications.
[13] Levent Ertaul,et al. Computing Aggregation Function Minimum/Maximum using Homomorphic Encryption Schemes in Wireless Sensor Networks (WSNs) , 2007, ICWN.
[14] Insup Lee,et al. Quantifying eavesdropping vulnerability in sensor networks , 2005, DMSN '05.
[15] Sanjay Kumar Madria,et al. Secure hierarchical data aggregation in wireless sensor networks , 2009, WCNC.
[16] Ben J Hicks,et al. SPIE - The International Society for Optical Engineering , 2001 .
[17] Dirk Westhoff,et al. Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation , 2006, IEEE Transactions on Mobile Computing.
[18] Peng Ning,et al. 2008 International Conference on Information Processing in Sensor Networks TinyECC: A Configurable Library for Elliptic Curve Cryptography in Wireless Sensor Networks ∗ , 2022 .
[19] Wendi B. Heinzelman,et al. Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.
[20] Theodore S. Rappaport,et al. SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[21] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[22] Konstantinos Kalpakis,et al. Efficient algorithms for maximum lifetime data gathering and aggregation in wireless sensor networks , 2003, Comput. Networks.
[23] Chee-Yee Chong,et al. Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.
[24] Gregory J. Pottie,et al. Self-organizing distributed sensor networks , 1999, Defense, Security, and Sensing.
[25] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[26] Michael D. Smith,et al. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[27] Dirk Westhoff,et al. Tinypeds: Tiny Persistent Encrypted Data Storage 3 in Asynchronous Wireless Sensor Networks 4 , 2006 .
[28] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[29] Alfred Menezes,et al. Elliptic curve public key cryptosystems , 1993, The Kluwer international series in engineering and computer science.
[30] Hui Tang,et al. Modeling on Secure Data Aggregation of Wireless Sensor Networks Based on Evaluation of Creditability , 2010, 2010 International Conference on Internet Technology and Applications.
[31] Aldar C.-F. Chan,et al. Concealed Data Aggregation for Wireless Sensor Networks , 2009 .
[32] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.