Multi-functional secure data aggregation schemes for WSNs
Tài liệu tham khảo
Stojmenovic, 2014, Machine-to-machine communications with in-network data aggregation, processing, and actuation for large-scale cyber-physical systems, IEEE Internet Things J., 1, 122, 10.1109/JIOT.2014.2311693
He, 2016, Privacy-preserving data aggregation scheme against internal attackers in smart grids, Wirel.Netw., 22, 491, 10.1007/s11276-015-0983-3
Riker, 2016, A two-tier adaptive data aggregation approach for m2m group-communication, IEEE Sens. J., 16, 823, 10.1109/JSEN.2015.2487445
Jiang, 2015, Exact top-k nearest keyword search in large networks, 393
M. Gupta, J. Gao, X. Yan, H. Cam, J. Han, Top-k interesting subgraph discovery in information networks, in:ICDE’14, IEEE, pp.820–831. 10.1109/ICDE.2014.6816703.
Lu, 2014, Secure and efficient data transmission for cluster-based wireless sensor networks, IEEE Trans. Parallel Distrib. Syst., 25, 750, 10.1109/TPDS.2013.43
Shim, 2014, A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks, IEEE Trans. Parallel Distrib. Syst., PP
He, 2007, Pda: privacy-preserving data aggregation in wireless sensor networks, 2045
Nath, 2008, Synopsis diffusion for robust aggregation in sensor networks, ACM Trans. Sens. Netw., 4, 7, 10.1145/1340771.1340773
Considine, 2009, Robust approximate aggregation in sensor data management systems, ACM Trans. Database Syst., 34, 6, 10.1145/1508857.1508863
Roy, 2012, Secure data aggregation in wireless sensor networks, IEEE Trans. Inf. Forensics Secur., 7, 1040, 10.1109/TIFS.2012.2189568
Castelluccia, 2009, Efficient and provably secure aggregation of encrypted data in wireless sensor networks, ACM Trans. Sens. Netw., 5, 1, 10.1145/1525856.1525858
Chen, 2012, Rcda: recoverable concealed data aggregation for data integrity in wireless sensor networks, IEEE Trans. Parallel Distrib. Syst., 23, 727, 10.1109/TPDS.2011.219
Lin, 2013, Cdama: concealed data aggregation scheme for multiple applications in wireless sensor networks, IEEE Trans. Knowl. Data Eng., 25, 1471, 10.1109/TKDE.2012.94
Han, 2011
Jose, 2013, Energy efficient recoverable concealed data aggregation in wireless sensor networks, 322
Lu, 2012, EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications, IEEE Trans. Parallel Distrib. Syst., 23, 1621, 10.1109/TPDS.2012.86
Perrig, 2001, Spins: security protocols for sensor networks, 189
NOAA, Tropical atmosphere ocean (tao) project, 2015, http://www.pmel.noaa.gov/tao.
Liu, 2008, Tinyecc: a configurable library for elliptic curve cryptography in wireless sensor networks, 245
De Meulenaer, 2008, On the energy cost of communication and cryptography in wireless sensor networks, 580
Cheng, 2009, Sampling based (ϵ, δ)-approximate aggregation algorithm in sensor networks, 273
S. Cheng, J. Li, Q. Ren, L. Yu, Bernoulli sampling based (ϵ, δ)-approximate aggregation in large-scale sensor networks, in:INFOCOM’10, IEEE, pp. 1-9. 10.1109/INFCOM.2010.5461929.
Li, 2012, (ϵ, δ)-approximate aggregation algorithms in dynamic sensor networks, IEEE Trans. Parallel Distrib. Syst., 23, 385, 10.1109/TPDS.2011.193
G. Cormode, K. Yi, Tracking distributed aggregates over time-based sliding windows, in: SSDBM’12, Springer, pp.416–430. 10.1007/978-3-642-31235-9_28.
Fang, 2014, Approximate multiple count in wireless sensor networks, 1474
Castelluccia, 2005, Efficient aggregation of encrypted data in wireless sensor networks, 109
Rivest, 1978, On data banks and privacy homomorphisms, Found.Secure Comput., 4, 169
Acharya, 2005, Secure comparison of encrypted data in wireless sensor networks, 47
Agrawal, 2004, Order preserving encryption for numeric data, 563
Fan, 2014, Privacy-enhanced data aggregation scheme against internal attackers in smart grid, IEEE Trans. Ind. Inf., 10, 666, 10.1109/TII.2013.2277938
Rezvani, 2015, Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks, IEEE Trans. Dependable Secure Comput., 12, 98, 10.1109/TDSC.2014.2316816
Xu, 2017, Pavs: a new privacy-preserving data aggregation scheme for vehicle sensing systems, Sensors, 17, 500, 10.3390/s17030500
Shen, 2016, A lightweight multi-layer authentication protocol for wireless body area networks, Future Gener. Comput. Syst., 12, 1
Fu, 2017, Privacy-preserving smart semantic search based on conceptual graphs over encrypted outsourced data, IEEE Trans. Inf. Forensics Secur., 12, 1874, 10.1109/TIFS.2017.2692728
Xia, 2016, A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data, IEEE Trans. Parallel Distrib. Syst., 27, 340, 10.1109/TPDS.2015.2401003
Ma, 2015, Kdvem: a k-degree anonymity with vertex and edge modification algorithm, Computing, 97, 1165, 10.1007/s00607-015-0453-x
Shen, 2017, An efficient public auditing protocol with novel dynamic structure for cloud data, IEEE Trans. Inf. Forensics Secur., 12, 2402, 10.1109/TIFS.2017.2705620