1]
Zhang Lei, Zhang Honggang, Conti M, et al. Preserving privacy against external and internal threats in WSN data aggregation[J]. Telecommunication Systems, 2013,52(4):2163-
2176.
[2] Memon I. An analysis of privacy preserving data aggregation protocols for WSNs[C]// The 9th IFIP International Conference on Network and Parallel Computing. 2012:119-
128.
[3] Kumar V, Madria S. PIP: Privacy and integrity preserving data aggregation in wireless sensor networks[C]// 2013 IEEE the 32nd International Symposium on Reliable
Distributed Systems. 2013:10-19.
[4] Zhou Jun, Zhen Yu Yang. Data privacy preservation in wireless sensor networks based on multisecret sharing scheme[C]// The 2nd International Conference on Information
Technology and Management Innovation. 2013:411-414.
[5] Wang Jin, Kim H, Tian Wei, et al. Data privacy protection solution for ubiquitous sensor networks[J]. Sensor Letters, 2013,11(2):384-387.
[6] Ukil A. Privacy preserving data aggregation in wireless sensor networks[C]// The 6th International Conference on Wireless and Mobile Communications. 2010:435-440.
[7] Westhoff D, Girao J, Acharya M. Concealed data aggregation for reverse multicast traffic in sensor networks: Encryption, key distribution, and routing adaptations[J].
IEEE Transactions on Mobile Computing, 2006,5(10):1417-1431.
[8] He Wenbo, Liu Xue, Hoang Nguyen, et al. PDA: Privacypreserving data aggregation in wireless sensor networks[C]// The 26th IEEE International Conference on Computer
Communications(INFOCOM 2007). 2007:2045-2053.
[9] Xu Huang, Sharma D. Fuzzy controller for a dynamic window in elliptic curve cryptography wireless networks for scalar multiplication[C]// 2010 the 16th AsiaPacific
Conference on Communications. 2010:458-463.
[10]Zhang Wensheng, Wang Chuang, Feng Taiming. GP2S: Generic privacypreservation solutions for approximate aggregation of sensor data [C]// 2008 the 6th Annual
IEEE International Conference on Pervasive Computing and Communications. 2008:179-184. |