共 13 条
[1]
Bagaa M., Younis M., Djenouri D., Et al., Distributed low-latency data aggregation scheduling in wireless sensor networks, ACM Transactions on Sensor Networks, 11, 3, (2015)
[2]
Xu Y., Lee W., Xu J., Et al., Processing window queries in wireless sensor networks, The 22nd International Conference on Data Engineering, pp. 70-80, (2006)
[3]
Xu J., Feng X., Yang F.-G., Et al., A data collection method by maximizing minimum probability of energy consumption for mobile Sink based WSNs, Acta Electronica Sinica, 43, 12, pp. 2470-2475, (2015)
[4]
Castelluccia C., Mykletun E., Tsudik G., Efficient aggregation of encrypted data in wireless sensor networks, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, pp. 109-117, (2005)
[5]
He W., Liu X., Nguyen H., Nahrstedt K., Abdelzaher T., PDA: Privacy-preserving data aggregation for information collection, ACM Transactions on Sensor Networks, 8, 1, (2011)
[6]
Ozdemir S., Miao P., Yang X., PRDA: polynomial regression-based privacy-preserving data aggregation for wireless sensor networks, Wireless Communications and Mobile Computing, 15, 4, pp. 615-628, (2015)
[7]
Lin Y.H., Chang S.Y., Sun H.M., CDAMA: concealed data aggregation scheme for multiple applications in wireless sensor networks, IEEE Transactions on Knowledge and Data Engineering, 25, 7, pp. 1471-1483, (2013)
[8]
Parmar K., Jinwala D.C., Concealed data aggregation in wireless sensor networks: A comprehensive survey, Computer Networks, 103, pp. 207-227, (2016)
[9]
Chen C.M., Lin Y.H., Lin Y.C., Et al., RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems, 23, 4, pp. 727-734, (2012)
[10]
Rezvani M., Ignjatovic A., Bertino E., Jha S., Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks, IEEE Transactions on Dependable and Secure Computing, 12, 1, pp. 98-110, (2015)