共 11 条
[1]
Ramesh R., Varshney P.K., Data aggregation techniques in sensor networks: A survey, Communications Surveys & Tutorials, 8, 4, pp. 48-63, (2006)
[2]
Ozdemir S., Yang X., Secure data aggregation in wireless sensor networks: A comprehensive overview, Computer Networks, 53, 12, pp. 2022-2037, (2009)
[3]
Guo J., Fang J.A., Chen X.M., Survey on secure data aggregation for wireless sensor networks, IEEE Internaional Conference on SOLI, 7, pp. 138-143, (2011)
[4]
Przydatek B., Song D., Perrig A., SIA: Secure information aggregation in sensor networks, Proc of 1st Conference on Em-Bedded Networked Sensor Systems, pp. 255-265, (2003)
[5]
He W., Liu X., Nguyen H., PDA: Privacy-preserving data aggregation in wireless sensor networks, Proceedings of the 26th IEEE International Conference on Computer Communications (INFO-COM), pp. 2045-2053, (2007)
[6]
Westhoff D., Girao J., Acharya M., Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distri-bution, and routing adaptation, IEEE Transactions on Mobile Computing, 5, 10, pp. 1417-1431, (2006)
[7]
Chen C.M., Lin Y.H., Lin Y.C., RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems, 23, 4, pp. 727-734, (2012)
[8]
Eschenauer L., Gligor V.D., A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41-47, (2002)
[9]
Madden S., Franklin M.J., Hellerstein J.M., TAG: A tiny aggregation service for ad-hoc sensor networks, Proceedings of the 5th symposium on Operating systems design and implementation, pp. 131-146, (2002)
[10]
Domingo-Ferrer J., A provably secure additive and multi-plicative privacy homomorphism, Proceedings of the Information Security Conference, pp. 471-483, (2002)