[1] 赵文举. 低功耗广覆盖LoRa系统的研究与应用[D]. 北京:北京邮电大学, 2019.
[2] 甘志祥. 物联网的起源和发展背景的研究[J]. 现代经济信息, 2010(1):158.
[3] 窦轶. 无线传感器网络隐私数据查询技术研究[D]. 南京:南京邮电大学, 2014.
[4] 喻旅游. 基于隐私保护和完整性验证的范围查询技术研究[D]. 湘潭:湘潭大学, 2018.
[5] 张晓玮. 无线传感网中数据聚合的隐私保护研究[D]. 曲阜:曲阜师范大学, 2019.
[6] 张亚如. 无线传感器网络数据查询中隐私保护研究[D]. 重庆:重庆邮电大学, 2016.
[7] 刘瑜. 大数据时代下计算机网络信息安全问题探讨[J]. 网络安全技术与应用, 2019(11):68-69.
[8] 庄报春. 基于物联网的计算机网络安全分析[J]. 网络安全技术与应用, 2020(3):8-9.
[9] 雷婧. 基于LoRaWAN的无线抄表方法的研究与改进[D]. 兰州:兰州大学, 2019.
[10]XU J, YANG G, CHEN Z Y, et al. A survey on the privacy-preserving data aggregation in wireless sensor networks[J]. China Communications, 2015,12(5):162-180.
[11]GROAT M M, HEY W, FORREST S. KIPDA: K-indistinguishable privacy-preserving data aggregation in wireless sensor networks[C]// Proceedings of the 2011 IEEE INFOCOM. 2011:2024-2032.
[12]OZDEMIR S, XIAO Y. Polynomial regression based secure data aggregation for wireless sensor networks[C]// Proceedings of the 2011 IEEE Global Telecommunications Conference-GLOBECOM 2011. 2011:1-5.
[13]BISTA R, HEE-DAE K, CHANG J W. A new private data aggregation scheme for wireless sensor networks[C]// Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology. 2010:273-280.
[14]WANG H, SU Y J, HUANG X H, et al. Algorithm for distributed traffic traces aggregation based on SMC[C]// Proceedings of the 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems. 2012:1068-1071.
[15]HE W B, NGUYEN H, LIU X, et al. iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks[C]// Proceedings of the 2008 IEEE Military Communications Conference. 2008:1-7.
[16]HE W B, LIU X, NGUYEN H, et al. PDA: Privacy-preserving data aggregation in wireless sensor networks[C]// Proceedings of the 2007 26th IEEE International Conference on Computer Communications. 2007:2045-2053.
[17]HUA P W, LIU X W, YU J G, et al. Energy-efficient adaptive slice-based secure data aggregation scheme in WSN[J]. Procedia Computer Science, 2018,129:188-193.
[18]GIRAO J, WESTHOFF D, SCHNEIDER M. CDA: Concealed data aggregation for reverse multicast traffic in wireless sensor networks[C]// Proceedings of the 2005 IEEE International Conference on Communications. 2005:3044-3049.
[19]ELHOSENY M, ELMINIR H, RIAD A, et al. A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption[J]. Journal of King Saud University-Computer Information Sciences, 2016,28(3):262-275.
[20]ZHONG H, SHAO L L, CUI J, et al. An efficient and secure recoverable data aggregation scheme for heterogeneous wireless sensor networks[J]. Journal of Parallel Distributed Computing, 2018,111:1-12.
[21]晁昭昭. 基于全同态加密的数据隐私区块链研究[D]. 咸阳:西北农林科技大学, 2019.
[22]朱聪聪. 基于抗泄漏同态加密的智能电网数据聚合协议研究[D]. 南京:南京邮电大学, 2020.
[23]LEE J, BYUN H, LIM H. Dual-load bloom filter: Application for name lookup[J]. Computer Communications, 2020,151:1-9.
[24]SINGH A, GARG S, KAUR R, et al. Probabilistic data structures for big data analytics: A comprehensive review[J]. Knowledge-Based Systems, 2020,188:104987.
[25]周继平,陈虹,叶正茂. 基于区块链技术的学分银行构建[J]. 中国职业技术教育, 2019(18):51-58.
[26]袁勇,王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016,42(4):481-494.
[27]邵奇峰,金澈清,张召,等. 区块链技术:架构及进展[J]. 计算机学报, 2018,41(5):969-88.
[28]何蒲,于戈,张岩峰,等. 区块链技术与应用前瞻综述[J]. 计算机科学, 2017,44(4):1-7.
[29]梅颖. 基于区块链的物联网访问控制简化模型构建[J]. 中国传媒大学学报(自然科学版), 2017,24(5):7-12.
[30]汪普庆,瞿翔,熊航,等. 区块链技术在食品安全管理中的应用研究[J]. 农业技术经济, 2019(9):82-90.
|