[1] GUBBI J, BUYYA R, MARUSIC S, et al. Internet of Things (IoT): a vision, architectural elements, and future directions [J]. Future Generation Computer Systems, 2013, 29(7): 1645-1660. [2] YICK J, MUKHERJEE B, GHOSAL D, Wireless sensor network survey [J]. Computer Networks, 2008, 52(12): 2292-2330. [3] AKKAYA K, DEMIRBAS M, AYGUN R S, The impact of data aggregation on the performance of wireless sensor networks [J]. Wireless Communications and Mobile Computing, 2008, 8(2): 171-193. [4] DU W, DENG J, HAN Y S, et al. A witness-based approach for data fusion assurance in wireless sensor networks [C]// Proceedings of the 2003 IEEE Global Telecommunications Conference. Piscataway, NJ: IEEE, 2003, 3: 1435-1439. [5] HU L, EVANS D, Secure aggregation for wireless networks[C]// Proceedings of the 2003 Applications and the Internet Workshops. Washington, DC: IEEE Computer Society, 2003: 384-391. [6] PRZYDATEK B, SONG D, PERRIG A. SIA: secure information aggregation in sensor networks [C]// SenSys '03: Proceedings of the 1st international Conference on Embedded Networked Sensor Systems. New York: ACM, 2003: 255-265. [7] WESTHOFF D, GIRAO J, ACHARYA M, Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation [J]. IEEE Transactions on Mobile Computing, 2006, 5(10): 1417-1431. [8] CASTELLUCCIA C, MYKLETUN E, TSUDIK G. Efficient aggregation of encrypted data in wireless sensor networks [C]// MOBIQUITOUS '05: Proceedings of the the2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. Washington, DC: IEEE Computer Society, 2005:109-117. [9] MYKLETUN E, GIRAO J, WESTHOFF D. Public key based cryptoschemes for data concealment in wireless sensor networks [C]// Proceedings of the 2006 IEEE International Conference on Communications. Piscataway, NJ: IEEE, 2006, 5: 2288-2295. [10] PETER S, WESTHOFF D, CASTELLUCCIA C. A survey on the encryption of convergecast traffic with in-network processing [J]. IEEE Transactions on Dependable and Secure Computing, 2010, 7(1): 20-34. [11] CASTELLUCCIA C, CHAN A C F, MYKLETUN E, et al. Efficient and provably secure aggregation of encrypted data in wireless sensor networks [J]. ACM Transactions on Sensor Networks, 2009, 5(3): Article No. 20. [12] BOUDIA O R M, SENOUCI S M, FEHAM M, A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography [J]. Ad Hoc Networks, 2015, 32(C): 98-113. [13] CHEN S, WANG G, JIA W. Cluster-group based trusted computing for mobile social networks using implicit social behavioral graph [J]. Future Generation Computer Systems, 2016,55: 391-400. [14] ZHANG Q Y, WANG R C, SHA C, et al. Node correlation clustering algorithm for wireless multimedia sensor networks based on overlapped FoVs [J]. Journal of China Universities of Posts and Telecommunications, 2013, 20(5): 37-44. [15] LIU Z, YUAN Y, GUAN X, et al. An approach of distributed joint optimization for cluster-based wireless sensor networks [J]. IEEE/CAA Journal of Automatica Sinica, 2015, 2(3): 267-273. [16] SUN H M, LIN Y H, HSIAO Y C, et al. An efficient and verifiable concealed data aggregation scheme in wireless sensor networks [C]// ICESS '08: Proceedings of the 2008 International Conference on Embedded Software and Systems. Washington, DC: IEEE Computer Society, 2008: 19-26. [17] KERRY C F, SECRETARY A, DIRECTOR C R. FIPS pub 186-4 federal information processing standards publication Digital Signature Standard (DSS) [S]. Gaithersburg: National Institute of Standards & Technology, 2013. |