An Outline of Data Aggregation Security in Heterogeneous Wireless Sensor Networks
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[2] Brian J. Matt,et al. Finding Invalid Signatures in Pairing-Based Batches , 2007, IMACC.
[3] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[4] Salah A. Aly,et al. Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks , 2008, IEEE INFOCOM Workshops 2008.
[5] R. Jueneman,et al. Message authentication , 1985, IEEE Communications Magazine.
[6] Shiuh-Pyng Shieh,et al. Secure encrypted-data aggregation for wireless sensor networks , 2010, Wirel. Networks.
[7] Gustavus J. Simmons,et al. Symmetric and Asymmetric Encryption , 1979, CSUR.
[8] Suat Ozdemir,et al. Concealed Data Aggregation in Heterogeneous Sensor Networks using Privacy Homomorphism , 2007, IEEE International Conference on Pervasive Services.
[9] Zhenfu Cao,et al. Cryptanalysis and improvement of an elliptic curve Diffie-Hellman key agreement protocol , 2008, IEEE Communications Letters.
[10] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[11] H. Cam,et al. SRDA: secure reference-based data aggregation protocol for wireless sensor networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[12] Josna Jose,et al. A SURVEY ON SECURE DATA AGGREGATION PROTOCOLS IN WIRELESS SENSOR NETWORKS , 2012 .
[13] Krishnan Murugan,et al. Secure Framework for Data Centric Heterogeneous Wireless Sensor Networks , 2010, CNSA.
[14] Ramakrishnan Srikant,et al. Order preserving encryption for numeric data , 2004, SIGMOD '04.
[15] Gelareh Taban,et al. Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks , 2009, 2009 International Conference on Computational Science and Engineering.
[16] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[17] Kyung-Ah Shim,et al. A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[18] Miguel Garcia,et al. GBP-WAHSN: A Group-Based Protocol for Large Wireless Ad Hoc and Sensor Networks , 2008, Journal of Computer Science and Technology.
[19] J. Lloret,et al. A Group-Based Protocol for Large Wireless AD-HOC and Sensor Networks , 2008, NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops.
[20] Hung-Min Sun,et al. RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.
[21] Azeddine Bilami,et al. A Cross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous WSNs , 2015, IEEE Communications Letters.
[22] Angela M. Mielke,et al. Heterogeneous Wireless Sensor Networks , 2008, Algorithms and Protocols for Wireless Sensor Networks.
[23] Wei Zhang,et al. Deploying a Heterogeneous Wireless Sensor Network , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[24] H. S. Wolff,et al. iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.
[25] Azeddine Bilami,et al. SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs , 2016, Telecommun. Syst..
[26] Theodore S. Rappaport,et al. SecureDAV: a secure data aggregation and verification protocol for sensor networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[27] Kavit Shah. Secure data aggregation protocol for sensor networks , 2015 .
[28] Aldar C.-F. Chan,et al. Symmetric-Key Homomorphic Encryption for Encrypted Data Processing , 2009, 2009 IEEE International Conference on Communications.