[1] Akyildiz I F,Su W,Sankarasubramaniam Y.A Survey on Sensor Networks[J].IEEE Communications Magazine,2002,40(8):102-114.
[2] Tang Xueyan,Xu Jianliang.Extending Network Lifetime for Precision Constrained Data Aggregation in Wireless sensor Networks[C]//Proceedings of the 25th IEEE International Conference on Computer Communications.Piscataway,USA:IEEE Press,2006:131-146.
[3] Hu Lingxuan,Evans D.Secure Aggregation for Wireless Networks[C]//Proceedings of Workshop on Security and Assurance in Ad hoc Networks.Orlando,USA:IEEE Press,2003:384-390.
[4] Przydatek B,Song D,Perrig A.SIA:Secure Information Aggregation in Sensor Networks[C]//Proceedings of SenSys’03.[S.l.]:IEEE Press,2003:255-265.
[5] Yang Yi,Wang Xinran,Zhu Sencun,et al.SDAP:A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks[C]//Proceedings of MOBIHOC’06.[S.l.]:ACM Press,2006:1-30.
[6] Westhoff D,Girao J,Acharya M.Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks:Encryption,Key Distribution and Routing Adaptation[J].IEEE Transactions on Mobile Com-puting,2006,5(10):1417-1431.
[7] Wu K,Dreef D,Sun B,et al.Secure Data Aggregation Without Persistent Cryptographic Operations in Wireless Sensor Networks[J].Ad Hoc Networks,2007,5(1):100-111.
[8] Ozdemir S.Secure,Reliable Data Aggregation for Wireless Sensor Networks[M]//Ichikawa H,Cho We-Duke,Satoh I.Ubiquitous Computing Systems,Tokyo,Japan:[s.n.],2007:25-28.
[9] He W,Liu X,Nguyen H,et al.PDA:Privacy-preserving Data Aggregation in Wireless Sensor Networks[C]//Proceedings of the 26th IEEE International Conference on Computer Communications.Piscataway,USA:IEEE Press,2006:165-168.
[10] Girao J,Westhoff D,Schneider M.CDA:Concealed Data Aggregation in Wireless Sensor Networks[C]//Proceedings of ACM Workshop on Wireless Security.Philadelphia,USA:IEEE Press,2004:3044-3049.
[11] Mykletun E,Girao J,Westhoff D.Public Key Based Cryptoschemes for Data Concealment in Wireless Sensor Networks[C]//Proceedings of IEEE International Conference on Communications.Istanbul,Turkey:IEEE Press,2006:2288-2295.
[12] Sang Y,Shen H,Inoguchi Y,et al.Secure Data Aggregation in Wireless Sensor Networks:A Survey[C]//Proceedings of the 7th International Conference on Parallel and Distributed Computing,Applications and Technologies.Washington D.C.,USA:IEEE Computer Society,2006:315-320.
[13] Cam H,Ozdemir S.Energy-efficient Security Protocol for Wireless Sensor Networks[C]//Proceedings of the 58th Vehicular Technology Conference.New York,USA:IEEE Press,2003:2981-2984.
[14] Acharya M,Girao J.Secure Comparison of Encrypted Data in Wireless Sensor Networks[C]//Proceedings of the 3rd International Symposium on Modeling and Optimization in Mobile,Ad Hoc,and Wireless Networks.Trentino,Italy:IEEE Press,2005:47-53.
[15] Huang S I,Shiuhpyng S,Tygar J D.Secure Encrypted-data Aggregation for Wireless Sensor Network[J].Wireless Networks,2010,16(4):915-927.
[16] Domingo-Ferrer J.A Provably Secure Additive and Multiplicative Privacy Homomorphism[C]//Procee-dings of the 5th International Conference on Information Security.London,UK:Springer-Verlag,2002:471-483.
[17] Castelluccia C,Mykletun E,Tsudik G.Efficient Aggregation of Encrypted Data in Wireless Sensor Networks[C]//Proceedings of the 2nd Annual Inter-national Conference on Mobile and Ubiquitous Systems:Networking and Services.[S.l.]:IEEE Press,2005:109-117.
[18] Ozdemir S.Concealed Data Aggregation in Hetero-geneous Sensor Networks using Privacy Homomorphism[C]// Proceedings of IEEE International Conference on Pervasive Services.Istanbul,Turkey:IEEE Press,2007:165-168.
[19] 郭江鸿,马建峰.安全透明的无线传感器网络数据汇聚方案[J].通信学报,2012,33(10):51-59.
编辑 陆燕菲 |