[1] BUTUN I, MORGERA S D, SANKAR R. A survey of intrusion detection systems in wireless sensor networks[J]. IEEE Communications Surveys & Tutorials, 2014, 16(1):266-282. [2] 范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,35(6):1131-1146.(FAN Y J, CHEN H, ZHANG X Y. Data privacy preservation in wireless sensor networks[J]. Chinese Journal of Computers, 2012, 35(6):1131-1146.) [3] SHENG B, LI Q. Verifiable privacy-preserving range query in two-tiered sensor networks[C]//Proceedings of the 2008 IEEE 27th Conference on Computer Communications. Piscataway, NJ:IEEE, 2008:46-50. [4] FAN Y C, CHEN A L P. Efficient and robust sensor data aggregation using linear counting sketches[EB/OL].[2016-11-16]. http://web.nchu.edu.tw/~yfan/index.files/ipdps.pdf. [5] COMAN A, NASCIMENTO M A, SANDER J. A framework for spatio-temporal query processing over wireless sensor networks[C]//Proceedings of the 20041st International Workshop on Data Management for Sensor Networks:in Conjunction with VLDB. New York:ACM, 2004:104-110. [6] GENTRY C. Fully homomorphic encryption using ideal lattices[C]//Proceedings of the 41st Annual ACM Symposium on Theory of Computing. New York:ACM, 2009:169-178. [7] ZENG J, WU Y, WU Y, et al. Energy-efficient and privacy-preserving range query in participatory sensing[C]//Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA. Piscataway, NJ:IEEE, 2016:876-883. [8] CUI J, ZHONG H, TANG X, et al. A fined-grained privacy-preserving access control protocol in wireless sensor networks[C]//Proceedings of the 9th International Conference on Utility and Cloud Computing. New York:ACM, 2016:382-387. [9] YU L, LI J Z, GAO H, et al. Enabling ε-approximate querying in sensor networks[J]. Proceedings of the VLDB Endowment, 2009, 2(1):169-180. [10] 戴华,何瑞良,杨庚,等.基于桶划分的两层传感网隐私保护Top-k查询[J].北京邮电大学学报,2015,38(5):18-22.(DAI H, HE R L, YANG G, et al. Bucket partition based privacy-preserving Top-k query processing in two-tiered wireless sensor networks[J]. Journal of Beijing University of Posts and Telecommunications, 2015, 38(5):18-22.) [11] GNAWALI O, JANG K Y, PAEK J, et al. The Tenet architecture for tiered sensor networks[C]//Proceedings of the 4th International Conference on Embedded Networked Sensor Systems. New York:ACM, 2006:153-166. [12] SZEWCZYK R, FERENCZ A. Energy implication of network sensor designs[EB/OL]. (2008-04-01)[2015-06-30]. http://bwrcs.eecs.berkeley.edu/Classes/CS252/Projects/Reports/robert_szewczyk.pdf. [13] 范永健,陈红,张晓莹,等.无线传感器网络中隐私保护通用近似查询协议[J].计算机学报,2014,37(6):918-920.(FAN Y J, CHEN H, ZHANG X Y, et al. Privacy-preserving generic approximate query in wireless sensor networks[J]. Chinese Journal of Computers, 2014, 37(6):918-920.) [14] 张晓莹,董蕾,陈红.无线传感器网络隐私保护范围查询处理技术[J].华东师范大学学报(自然科学版),2015,2015(5):1-13.(ZHANG X Y, DONG L, CHEN H. Privacy-preserving range query processing in wireless sensor networks[J]. Journal of East China Normal University (Natural Science), 2015, 2015(5):1-13.) [15] 迟令.基于无线传感器网络的身份认证体系的研究[D].长春:吉林大学,2015:11-12.(CHI L. The research of identity authenticantion system on wireless sensor networks[D]. Changchun:Jilin University, 2015:11-12.) |