Efficient data aggregation with in-network integrity control for WSN
暂无分享,去创建一个
[1] Peter Langendoerfer,et al. On Concealed Data Aggregation for WSNs , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[2] Shivakant Mishra,et al. A Practical Study of Transitory Master Key Establishment ForWireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[3] Yacine Challal,et al. An efficient and highly resilient key management scheme for wireless sensor networks , 2010, IEEE Local Computer Network Conference.
[4] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[5] M. Raina,et al. Secure data aggregation using commitment schemes and quasi commutative functions , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.
[6] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[7] Yang Xiao,et al. Secure data aggregation without persistent cryptographic operations in wireless sensor networks , 2007, Ad Hoc Networks.
[8] David E. Culler,et al. TOSSIM: accurate and scalable simulation of entire TinyOS applications , 2003, SenSys '03.
[9] David E. Culler,et al. SPINS: security protocols for sensor networks , 2001, MobiCom '01.
[10] Ian F. Blake,et al. Advances in Elliptic Curve Cryptography: Preface , 2005 .
[11] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[12] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[13] Matt Welsh,et al. Simulating the power consumption of large-scale sensor network applications , 2004, SenSys '04.
[14] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[15] Lingxuan Hu,et al. Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[16] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[17] Patel Swapnil. Secure Data Aggregation in Wireless Sensor Networks : A Survey , 2013 .
[18] Salah A. Aly,et al. Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks , 2008, IEEE INFOCOM Workshops 2008.
[19] Ian F. Blake,et al. Advances in Elliptic Curve Cryptography: Frontmatter , 2005 .
[20] Yacine Challal,et al. Enhancing resilience of probabilistic key pre-distribution schemes for WSNs through hash chaining , 2010, CCS '10.
[21] Juan Manuel González Nieto,et al. RSDA: Reputation-Based Secure Data Aggregation in Wireless Sensor Networks , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[22] Hailin Feng,et al. Efficient Secure In-Network Data Aggregation in Wireless Sensor Networks , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.
[23] C. Castelluccia,et al. Efficient aggregation of encrypted data in wireless sensor networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[24] David E. Culler,et al. System architecture directions for networked sensors , 2000, SIGP.
[25] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[26] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[27] Theodore S. Rappaport,et al. SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[28] S. Peter,et al. On Concealed Data Aggregation for Wireless Sensor Networks , 2006 .
[29] Yacine Challal,et al. Information Security in Wireless Sensor Networks , 2009 .
[30] Rabindra Bista,et al. A New Approach to Secure Aggregation of Private Data in Wireless Sensor Networks , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.