共 15 条
[1]
Madden S., Franklin M.J., Hellerstein J.M., Et al., TAG: A tiny aggregation service for ad-hoc sensor networks , ACM SIGOPS Operating Systems Review, 36, pp. 131-146, (2002)
[2]
Zhang L., Li X., Liu Y., Et al., Verifiable private multi-party computation: ranging and ranking , 2013 Proceedings of 33th IEEE INFOCOM, pp. 605-609, (2013)
[3]
Othman S.B., Trad A., Youssef H., Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks , 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 188-195, (2013)
[4]
Conti M., Willemsen J., Crispo B., Providing Source Location Privacy in Wireless Sensor Networks: A Survey , IEEE Communication Surveys and Tutorials, 15, 3, pp. 1238-1280, (2013)
[5]
Yang Y., Wang X., Zhu S., Et al., SDAP: A secure hop-by-hop data aggregation protocol for sensor networks , ACM Transactions on Information and System Security (TISSEC), 11, 4, pp. 356-367, (2008)
[6]
Eschenauer L., Gligor V.D., A key-management scheme for distributed sensor networks , Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41-47, (2002)
[7]
Zia T., Zomaya A., A secure triple-key management scheme for wireless sensor networks , Proceedings of 25th IEEE INFCOM, pp. 1-2, (2006)
[8]
Yu Z., Guan Y., A key management scheme using deployment knowledge for wireless sensor networks , IEEE Transactions on Parallel and Distributed Systems, 19, 10, pp. 1411-1425, (2006)
[9]
He W., Liu X., Nguyen H., Et al., PDA: Privacy-preserving data aggregation in wireless sensor networks , Proceedings of the 26th IEEE INFOCOM, pp. 2045-2053, (2007)
[10]
Castelluccia C., Mykletun E., Tsudik G., Efficient aggregation of encrypted data in wireless sensor networks , The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2005 (MobiQuitous 2005), pp. 109-117, (2005)