[1] LOGANATHAN S, ARUMUGAM J.Energy efficient clustering algorithm based on particle swarm optimization technique for wireless sensor networks[J].Wireless Personal Communications, 2021, 119(1):815-843. [2] KUMAR D A, AWADESH K S.I-FBECS:improved fuzzy based energy efficient clustering using biogeography based optimization in wireless sensor network[J].Transactions on Emerging Telecommunications Technologies, 2020, 32(2):235-246. [3] HUY N N, KIM M K.Link quality estimation from burstiness distribution metric in industrial wireless sensor networks[J].Energies, 2020, 13(23):6430-6430. [4] JASPREET S, RANJIT K, DAMANPREET S.A survey and taxonomy on energy management schemes in wireless sensor networks[J].Journal of Systems Architecture, 2020, 111:101-113. [5] DEEPIKA A.Optimization of cluster heads through harmony search algorithm in wireless sensor networks[J].Journal of Intelligent & Fuzzy Systems, 2020, 39(6):8587-8597. [6] 胡雨婷.物联网环境下可验证隐私保护多维数据查询研究[D].湘潭:湘潭大学, 2020. HU Y T.Research on verifiable privacy protection multidimensional data query in Internet of things[D].Xiangtan:Xiangtan University, 2020.(in Chinese) [7] TSOU Y T, LU C S, KUO S Y.SER:Secure and efficient retrieval for anonymous range query in wireless sensor networks[J].Computer Communications, 2017, 108(1):1-16. [8] LIANG J, JIANG C, MA X, et al.Secure data aggregation for top-k queries in tiered wireless sensor networks[J]. Adhoc & Sensor Wireless Networks, 2016, 32(2):51-78. [9] 马行坡, 梁俊斌, 马文鹏, 等.面向双层传感网的安全Top-k查询协议[J].计算机研究与发展, 2018, 55(11):2490-2500. MA X P, LIANG J B, MA W P, et al.Secure top-k query protocol for double-layer sensor networks[J].Journal of Computer Research and Development, 2018, 55(11):2490-2500.(in Chinese) [10] DAI H, WEI T, HUANG Y, et al.Random secure comparator selection based privacy-preserving MAX/MIN query processing in two-tiered sensor networks[J].Journal of Sensors, 2016(6):1-13. [11] 王敏.面向无线传感器网络的安全MAX/MIN查询技术[D].南京:南京邮电大学, 2018. WANG M.Secure max/min query technology for Wireless Sensor Networks[D].Nanjing:Nanjing University of Posts and Telecommunications, 2018.(in Chinese) [12] CHEN F, LIU A X.Privacy-and integrity-preserving range queries in sensor networks[J].IEEE/ACM Transactions on Networking, 2012, 20(6):1774-1787. [13] 陈正宇, 戴华, 叶庆群, 等.两层WSN安全范围查询技术综述[J].计算机工程与应用, 2017, 53(19):26-32, 39. CHEN Z Y, DAI H, YE Q Q, et al.Overview of security range query technology in two-tier WSN[J].Computer Engineering and Applications, 2017, 53(19):26-32, 39.(in Chinese) [14] DAI H, YE Q, YANG G, et al.CSRQ:communication-efficient secure range queries in two-tiered sensor networks[J].Sensors, 2016, 16(2):259. [15] 戴华, 杨庚, 秦小麟, 等.面向隐私保护的两层传感网Top-k查询处理方法[J].计算机研究与发展, 2013, 50(6):1239-1252. DAI H, YANG G, QIN X L, et al.Top-k query processing method for two-layer sensor network for privacy protection[J].Journal of Computer Research and Development, 2013, 50(6):1239-1252.(in Chinese) [16] KRAWCZYK H, CANETTI R, BELLARE M.HMAC:keyed-hashing for message authentication[EB/OL].[2021-06-10].http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.383.2086&rep=rep1&type=pdf. [17] BERLIN M A.A HMAC algorithm based secure online transaction system using block chain technology[EB/OL].[2021-06-10].https://www.researchgate.net/publication/346769100. [18] KHARE S K.Fast-track message authentication protocol for DSRC using HMAC and group keys[J].Applied Acoustics, 2020, 165(1):107-131. [19] HARIKRISHNA B, KIRAN D S, DEEP K M.Network as a service model in cloud authentication by HMAC algorithm[J].International Journal of Advanced Networking and Applications, 2018, 9(6):458-467. [20] SRINIVASAN S, SHIVAKUMAR K B, MUAZZAM M.HMAC-RSA:a security mechanism in cognitive radio for enhancing the security in a radio cognitive system[J].Journal of Intelligent & Fuzzy Systems, 2019, 36(5):4449-4459. [21] HARBA E S I.Secure data encryption through a combination of AES, RSA and HMAC[J].Engineering, Technology & Applied Science Research, 2017, 7(4):1781-1785. [22] 刘瑛琳.三端混合直流输电线路保护方法研究[D].北京:北京交通大学, 2019. LIU Y L.Research on protection method of three-terminal hybrid DC transmission line[D].Beijing:Beijing Jiaotong University, 2019.(in Chinese) [23] 张友骞.含可再生能源发电的概率可用输电能力研究[D].贵阳:贵州大学, 2019. ZHANG Y Q.Research on probabilistic available transmission capacity of power generation with renewable energy[D].Guiyang:Guizhou University, 2019.(in Chinese) |