[1] Ramesh R, Varshney P K. Data Aggregation Techniques in Sensor Networks: A Survey[J]. Communications Surveys & Tutorials, 2006, 8(4): 48-63. [2] Akyildiz I F, Su Weilian, Sankarasubramaniam Y, et al. Wireless Sensor Networks: A Survey[J]. Computer Networks, 2002, 38(4): 393-422. [3] Li Na, Zhang Nan, Dasa S K, et al. Privacy Preservation in Wireless Sensor Networks: A State-of-the-art Survey[J]. Ad Hoc Networks, 2009, 7(8): 1501-1514. [4] Chen Yanli, Yang Geng. An Efficient Broadcast Encryption Scheme for Wireless Sensor Network[C]//Proc. of International Conference on Wireless Communications, Networking and Mobile Computing. Shanghai, China: [s. n.], 2009. [5] 贺超英, 马行坡. 一种高效的无线传感器网络密钥管理方案[J]. 计算机工程, 2011, 37(11): 160-163. [6] 孔繁瑞, 李春文. 无线传感器网络动态密钥管理方法[J]. 软件学报, 2010, 21(7): 1679-1691. [7] Ozturk C, Zhang Yanzhou, Trappe W. Source Location Privacy in Energy Constrained Sensor Networks Routing[C]//Proc. of ACM Workshop on Security of Ad Hoc and Sensor Networks. [S. l.]: ACM Press, 2004: 88-93. [8] Mehta K, Liu Donggang, Wright M. Location Privacy in Sensor Networks Against a Global Eaves Dropper[C]//Proc. of IEEE International Conference on Network Protocols. [S. l.]: IEEE Press, 2007: 314-323. [9] Yang Yi, Shao Min, Zhu Sencun, et al. Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks[C]//Proc. of ACM Conference on Wireless Network Security. [S. l.]: ACM Press, 2008: 77-88. [10] Shao Min, Yang Yi, Zhu Sencun. Towards Statistically Strong Source Anonymity for Sensor Network[C]//Proc. of INFOCOM’08. Phoenix, USA: [s. n.], 2008. [11] Mehta K, Liu Donggang, Wright M. Protecting Location Privacy in Sensor Networks Against a Global Avesdropper[J]. IEEE Transactions on Mobile Computing, 2011, 11(2): 1-18. [12] Spachos P, Song Liang, Bui F M. Improving Source-location Privacy Through Opportunistic Routing in Wireless Sensor Networks[C]//Proc. of IEEE Symposium on Computers and Communications. [S. l.]: IEEE Press, 2011: 815-820. [13] Li Yun, Ren Jian. Source-Location Privacy Through Dynamic Routing in Wireless Sensor Networks[C]//Proc. of INFOCOM’10. San Diego, USA: [s. n.], 2010. [14] Zhang Zhiming, Jiang Changgen, Deng Jiangang. A Secure Anonymous Path Routing Protocol for Wireless Sensor Networks[C]//Proc. of IEEE International Conference on Wireless Communications, Networking and Information Security. [S. l.]: IEEE Press, 2010: 415-418. [15] Li Xinfeng, Wang Xiaoyuan, Zheng Nan. Enhanced Location Privacy Protection of Base Station in Wireless Sensor Networks[C]//Proc. of the 5th International Conference on Mobile Ad-hoc and Sensor Networks. [S. l.]: IEEE Press, 2009. [16] Ying Bidi, Gallardo J R, Makrakis D. Concealing of the Sink Location in WSNs by Artificially Homogenizing Traffic Intensity[C]//Proc. of IEEE Conference on Computer Communications Workshops. [S. l.]: IEEE Press, 2011: 988-993. [17] Kamat P, Xu Wenyuan, Trappe W. Temporal Privacy in Wireless Sensor Networks[C]//Proc. of Int’l Conference on Distributed Computing Systems. Toronto, Canada: [s. n.], 2007. [18] He Weibo, Nguyen H. PDA: Privacy-preserving Data Aggregation in Wireless Sensor Networks[C]//Proc. of the 26th IEEE International Conference on Computer Communications. Washington D. C., USA: IEEE Computer Society Press, 2007: 2045-2053. [19] Madden S, Franklin M J, Hellerstein J M. TAG: A Tiny Aggregation Service for Ad hoc Sensor Networks[C]//Proc. of the 5th Symposium on Operating Systems Design and Implementation. New York, USA: [s. n.], 2002: 131-146. [20] He Weibo, Liu Xue, Nguyen H. A Cluster-based Protocol to Enforce Integrity and Preserve Privacy in Data Aggregation[C]// Proc. of the 29th IEEE International Conference on Distributed Computing Systems. [S. l.]: IEEE Press, 2009: 14-19. [21] 杨 庚, 王安琪, 陈正宇, 等. 一种低耗能的数据融合隐私保护算法[J]. 计算机学报, 2011, 34(5): 792-800. [22] Girao J, Westhoff D, Schneider M. CDA: Concealed Data Aggregation in Wireless Sensor Networks[C]//Proc. of ACM Workshop on Wireless Security. [S. l.]: ACM Press, 2004. [23] Girao J, Westhoff D, Schneider M. CDA: Concealed Data Aggregation for Reverse Multicast Traffic in Wireless Sensor Networks[C]//Proc. of IEEE International Conference on Communications. Seoul, Korea: IEEE Press, 2005: 3044-3049. [24] Westhoff D, Girao J, Acharya M. Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation[J]. IEEE Trans. on Mobile Computer, 2006, 5(10): 1417-1431. [25] Steffen P, Dirk W, Claude C. A Survey on the Encryption of Convergecast Traffic with In-network Processing[J]. IEEE Transactions on Dependable and Secure Computing, 2010, 7(1): 20-34. [26] Castelluccia C, Mykletun E, Tsudik G. Efficient Aggregation of Encrypted Data in Wireless Sensor Networks[C]//Proc. of the 2nd Annual Int’l Conf. on Mobile and Ubiquitous Systems. Boston, USA: [s. n.], 2005. [27] Mykletun E, Girao J, Westhoff D. Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks[C]//Proc. of IEEE Int’l Conf. on Communications. [S. l.]: IEEE Press, 2006: 2288-2295. [28] Sun Hung-Min, Chen Chien-Ming, Lin Yue-Hsun. RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2011, 22(4): 727-734. [29] Yang Piyi, Cao Zhenfu, Dong Xiaolei. An Efficient Privacy Preserving Data Aggregation Scheme with Constant Communication Overheads for Wireless Sensor Networks[J]. IEEE Communications Letters, 2011, 15(1): 1205-1207. [30] Lin Xiaodong, Lu Rongxing, Shen Xuemin. MDPA: Multi- dimensional Privacy-preserving Aggregation Scheme for Wireless Sensor Networks[J]. Wireless Communication and Mobile Computing, 2010, 10(6): 843-856. [31] Arijit U, Jaydip S. Secure Multiparty Privacy Preserving Data Aggregation by Modular Arithmetic[C]//Proc. of International Conference on Parallel, Distributed and Grid Computing. Waknaghat, India: [s. n.], 2010. [32] Rabindra B, Kim H D, Jaewoo C H. A New Private Data Aggregation Scheme for Wireless Sensor Networks[C]//Proc. of IEEE International Conference on Computer and Information Technology. [S. l.]: IEEE Press, 2010: 273-280. [33] Wang Chuang, Wang Guiling, Zhang Wensheng. Reconciling Privacy Preservation and Intrusion Detection in Sensory Data Aggregation[C]//Proc. of INFOCOM’11. [S. l.]: IEEE Press, 2011: 336-340. [34] Groat M. M, He Wenbo, Forrest S. KIPDA: K-indistinguishable Privacy-preserving Data Aggregation in Wireless Sensor Networks[C]//Proc. of INFOCOM’11. [S. l.]: IEEE Press, 2011: 2024-2032. [35] He Weibo, Liu Xue, Nguyen H, et al. iPDA: An Integrity- protecting Private Data Aggregation Scheme for Wireless Sensor Networks[C]//Proc. of MILCOM’08. [S. l.]: IEEE Press, 2008: 1-7.
|