共 13 条
[1]
Ramesh R., Varshney P.K., Data aggregation techniques in sensor networks: A survey, Communications Surveys & Tutorials, 8, 4, pp. 48-63, (2006)
[2]
Yick J., Mukherjee B., Ghosal D., Wireless sensor network survey, Computer Networks, 52, 12, pp. 2292-2330, (2008)
[3]
He W., Nguyen H., PDA: Privacy-preserving data aggregation in wireless sensor networks, Proc of the 26th IEEE Int Conf on Computer Communications, pp. 2045-2053, (2007)
[4]
Castelluccia C., Mykletun E., Tsudik G., Efficient aggregation of encrypted data in wireless sensor networks, Proc of the 2nd Annual Int Conf on Mobile and Ubiquitous Systems in Computing, Networking and Services, pp. 109-117, (2005)
[5]
Yang G., Wang A., Chen Z., Et al., An energy-saving privacy-preserving data aggregation algorithm, Chinese Journal of Computers, 34, 5, pp. 792-800, (2011)
[6]
Bista R., Kim D., Chang J., A new private data aggregation scheme for wireless sensor networks, Proc of the 10th Int Conf on Computer and Information Technology, pp. 273-280, (2010)
[7]
Mao W., Modern Cryptography: Theory and Practice, pp. 118-160, (2003)
[8]
Colin B., Mao W., Kenneth G.P., Key agreement using statically keyed authenticators, Proc of the 2nd Int Conf on Applied Cryptography and Network Security (ACNS'04), pp. 248-262, (2004)
[9]
Eschenauer L., Gligor V., A key-management scheme for distributed sensor networks, Proc of the 9th ACM Conf on Computer and Communications Security, pp. 41-47, (2002)
[10]
Lu R., Lin X., Zhu H., Et al., BECAN: A bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks, IEEE Trans on Parallel and Distributed Systems, 23, 1, pp. 32-43, (2012)