[1]MUNI V K, KANDASAMY A, CHANDRASEKARAN K. Energy-efficient edge-based network partitioning scheme for wireless sensor networks [C]// Proceedings of the 2013 International Conference on Advances in Computing, Communications and Informatics. Piscataway: IEEE Press, 2013: 1017-1022.
[2]STEFFEN P, WESTHOFF D. A survey on the encryption of convergecast traffic with in-network processing [J]. IEEE Transactions on Dependable and Secure Computing, 2010, 7(1): 20-34.
[3]MARRIWALA N, RATHEE P. An approach to increase the wireless sensor network lifetime [C]// Proceedings of the 2012 World Congress on Information and Communication Technologies. Piscataway: IEEE Press, 2012: 495-499.
[4]CAYIRPUNAR O, TAVLI B. The impact of base station mobility patterns on wireless sensor network lifetime [C]// Proceedings of the 24th IEEE International Symposium on Personal Indoor and Mobile Radio Communications. Piscataway: IEEE Press, 2013: 2701-2706.
[5]LI N, ZHANG N, BHAVANI T, et al. Privacy preservation in wireless sensor networks: a state-of-the-art survey [J]. Ad Hoc Networks, 2009, 7(8): 1501-1514.
[6]HAIYING S, LIANYU Z. ALERT: an anonymous location-based efficient routing protocol in MANETs [J]. IEEE Transactions on Mobile Computing, 2013, 6(4): 1079-1093.
[7]KIM Y, LEE H, YOON M, et al. Hilbert-curve based data aggregation scheme to enforce data privacy and data integrity for wireless sensor networks [J]. International Journal of Distributed Sensor Networks, 2013, 2013: 1-14.
[8]HE W B, NGUYEN H, LIU X. iPDA: an integrity-protecting private data aggregation scheme for wireless sensor networks [C]// Proceedings of the 2008 IEEE Military Communications Conference. Piscataway: IEEE Press, 2008: 1-7.
[9]YANG G, LI S, XU X L, et al. Precision-enhanced and encryption-mixed privacy-preserving data aggregation in wireless sensor networks [J]. International Journal of Distributed Sensor Networks, 2013, 2013(4): 30-41.
[10]FAGEN L, PAN X. Practical secure communication for integrating wireless sensor networks into the Internet of things [J]. Sensors Journal, 2013, 13(10): 3677-3684.
[11]HE W, LIU X, NGUYEN H. A cluster-based protocol to enforce integrity and preserve privacy in data aggregation [C]// Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops. Piscataway: IEEE Press, 2009: 14-19.
[12]AGRAWAL R, SRIKNAT R. Privacy-preserving data mining [C]// Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data. New York: ACM Press, 2009: 439-450.
[13]HUANG Z L, DU W L, CHEN B. Deriving private information from randomized data [C]// Proceedings of the ACM SIGMOD International Conference on Management of Data. New York: ACM Press, 2005: 37-48.
[14]DOMINGO F J, HERRERA J. A new privacy homomorphism and applications [J]. Information Processing Letters, 1996, 60(5): 277-282.
[15]CASTELLUCCIA C, MYKLENTN E, TSUDIK G. Efficient aggregation of encrypted data in wireless sensor networks [C]// Proceedings of the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. Piscataway: IEEE Press, 2005: 109-117.
[16]HU L X, EVANS D. Secure aggregation for wireless networks [C]// Proceedings of the 2003 Symposium on Applications and the Internet Workshops. Washington, DC: IEEE Computer Society, 2011: 384-391.
[17]RABINDRA B, HYE K Y. Achieving scalable privacy preserving data aggregation for wireless sensor networks [C]// Proceedings of the 10th IEEE International Conference on Computer and Information Technology. Washington, DC: IEEE Computer Society, 2010: 1962-1969. |