Computer Engineering & Science
Previous Articles Next Articles
HU Zhen-hai,WANG Li-song
Received:
2019-02-23
Revised:
2019-06-13
Online:
2020-01-25
Published:
2020-01-25
HU Zhen-hai,WANG Li-song.
[1] | Yick J,Mukherjee B,Ghosal D.Wireless sensor network survey[J].Computer Networks,2008,52(12):2292-2330. |
[2] | Fan Yong-jian, Chen Hong, Zhang Xiao-ying. |
Data privacy preservation in wireless sensor networks[J].Chinese Journal of Computers,2012,35(6):1131-1146.(in Chinese) | |
[3] | He W,Liu X,Nguyen H,et al.PDA: Privacy-preserving data aggregation in wireless sensor networks[C]∥Proc of the 26th IEEE International Conference on Computer Communications,2007:2045-2053. |
[4] | Eschenauer L,Gligor V D. A key-management scheme for distributed sensor networks[C]∥Proc of the 9th ACM Conference on Computer and Communications Security,2002:41-47. |
[5] | Wang T,Qin X,Ding Y,et al.Privacy-preserving and energy-efficient continuous data aggregation algorithm in wireless sensor networks[J].Wireless Personal Communications,2018,98(1):665-684. |
[6] | Yao J,Wen G.Protecting classification privacy data aggregation in wireless sensor networks[C]∥Proc of International Conference on Wireless Communications, |
Networking and Mobile Computing,2008:1-5. | |
[7] | He W,Nguyen H,Xue L,et al.iPDA: An integrity-protecting private data aggregation scheme for wireless sensor networks[C]∥Proc of Military Communications Conference,2009:1-7. |
[8] | Yang Geng, Wang An-qi, Chen Zheng-yu, et al. An energy-saving privacy-preserving data aggregation algorithm[J].Chinese Journal of Computers,2011,34(5):792-800.(in Chinese) |
[9] | Li Wan-lei.Research and implementation of lightweight security data fusion scheme for wireless sensor network [D].Nanjing:Nanjing University of Posts and Telecommunications,2012.(in Chinese) |
[10] | Gu Yong-hao,Guo Da,Lin Jiu-chuan. Energy-saving privacy data secure aggregation method [J].Journal on Communications,2017,35(Z2): 112-116.(in Chinese) |
[11] | Castelluccia C,Mykletun E,Tsudik G.Efficient aggregation of encrypted data in wireless sensor networks[C]∥Proc of International Conference on Mobile and Ubiquitous Systems: Networking and Services,2005:109-117. |
[12] | Feng T,Wang C,Zhang W,et al.Confidentiality protection for distributed sensor data aggregation[C]∥Proc of IEEE Conference on Computer Communications,2008:56-60. |
[13] | Papadopoulos S,Kiayias A,Papadias D.Secure and efficient in-network processing of exact SUM queries[C]∥Proc of IEEE International Conference on Data Engineering,2011:517-528. |
[14] | Menezes A J, van Oorschot P C,Vanstone S A.Handbook of applied cryptography [M].Florida:CRC Press, 1996. |
[15] | Nath S,Yu H,Chan H.Secure outsourced aggregation via one-way chains[C]∥Proc of ACM SIGMOD International Conference on Management of Data,2009:31-44. |
[16] | Xie K,Ning X,Wang X,et al.An efficient privacy-preserving compressive data gathering scheme in WSNs[J].Information Sciences,2015,180(2):702-715. |
[17] | Boudia O R M, Senouci S M,Feham M.Secure and efficient verification for data aggregation in wireless sensor networks[J].International Journal of Network Management,2018,28(1): e2000. |
[18] | Karp B,Kung H T.GPSR:Greedy perimeter stateless routing for wireless networks[C]∥Proc of the 6th Annual International Conference on Mobile Computing and Networking,2000:243-254. |
[19] | Coman A,Sander J,Nascimento M A.Adaptive processing of historical spatial range queries in peer-to-peer sensor networks[J]. |
Distributed and Parallel Database,2007,22(2-3):133-163. | |
[20] | Rappaport T. Wireless communications: Principles and practice[M].New Jersey:Prentice-Hall Press,1996. |
[21] | Coman A,Sander J,Nascimento M A.Adaptive processing of historical spatial range queries in peer-to-peer sensor networks[J].Distributed and Parallel Databases,2007,22(2-3):133-163. |
[22] | Groat M M,Hey W,Forrest S.KIPDA:K-indistinguishable privacy-preserving data aggregation in wireless sensor networks[C]∥Proc of 2011 IEEE INFOCOM,2011: 2024-2032. |
附中文参考文献: | |
[2] | 范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,35(6):1131-1146. |
[8] | 杨庚,王安琪,陈正宇,等.一种低耗能的数据融合隐私保护算法[J].计算机学报,2011,34(5):792-800. |
[9] | 李万雷.无线传感器网络轻量级安全数据融合方案的研究与实现[D].南京:南京邮电大学,2012. |
[10] | 谷勇浩,郭达,林九川.低能耗的隐私数据安全融合方法[J].通信学报,2017,35(Z2): 112-116. |
[1] | YE Xi, ZHANG Yu-shu, ZHAO Ruo-yu, XIAO Xiang-li, WEN Wen-ying. Usability-enhanced thumbnail-preserving encryption [J]. Computer Engineering & Science, 2023, 45(09): 1563-1571. |
[2] | LUO Shi-hang, HE Qing. A multi-strategy fused equilibrium optimization algorithm and its application [J]. Computer Engineering & Science, 2023, 45(08): 1508-1520. |
[3] | LI Shuai, CHANG Jin-cai, LI-L Mu-zhi, CAI Kun-jie, . A Stacking ensemble clustering algorithm based on differential privacy protection [J]. Computer Engineering & Science, 2022, 44(08): 1402-1408. |
[4] | ZHAO Yu-hua, JIA Xiang-dong, HU Hai-xia, JING Le-tian . An AoI minimization scheme of UAV-assisted wireless sensor networks [J]. Computer Engineering & Science, 2022, 44(07): 1216-1222. |
[5] | KOU Bang-yan, CAO Su-zhen, Lv Jia . A privacy protection scheme for parking services based on fog computing [J]. Computer Engineering & Science, 2022, 44(07): 1232-1238. |
[6] | ZHANG Meng-jian, WANG Min, WANG Xiao, QIN Tao, YANG Jing, . A hybrid particle swarm-butterfly algorithm for WSN node deployment [J]. Computer Engineering & Science, 2022, 44(06): 1013-1022. |
[7] | GAO Hang, WU Jia-xin, CHEN Long, WU Ji-gang. Security communication path planning of UAV sensor network under QoS guarantee [J]. Computer Engineering & Science, 2022, 44(06): 1037-1045. |
[8] | XU Li-jin, HE Yan-fang. Construction of a traffic blocking model for wireless sensor network based on random forest algorithm [J]. Computer Engineering & Science, 2022, 44(05): 819-825. |
[9] | GOU Ping-zhang, YUAN Chen, ZHANG Fen. A non-uniform clustering QoS routing algorithm based on software-defined wireless sensor networks [J]. Computer Engineering & Science, 2022, 44(02): 227-236. |
[10] | YIN Ling, XIE Zhi-jun. Charging path planning of multiple mobile-chargers based on space-time collaboration [J]. Computer Engineering & Science, 2021, 43(12): 2183-2189. |
[11] | ZHANG Jing, WEI Miao, . WSN area coverage optimization based on Delaunay triangulation strategy [J]. Computer Engineering & Science, 2021, 43(11): 1944-1951. |
[12] | WEI Lian-suo, CHEN Qi-qi, HAN Jian, SU Yang. A topology control algorithm of potential-game network based on region splitting and merging [J]. Computer Engineering & Science, 2021, 43(11): 2063-2068. |
[13] | HU Yu-gu, GE Li-na, . An improved differential privacy parameter setting and data optimization algorithm [J]. Computer Engineering & Science, 2021, 43(10): 1758-1765. |
[14] | XIE Xiao-jie, LIANG Ying, WANG Zi-sen, DONG Xiang-xiang, . A quantitative evaluation method of social network users’ privacy leakage [J]. Computer Engineering & Science, 2021, 43(08): 1376-1386. |
[15] | . A federated ensemble algorithm for multi-source data security [J]. Computer Engineering & Science, 2021, 43(08): 1387-1397. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
湘公网安备 43010502000083号
湘ICP备10006030号
Copyright © Computer Engineering & Science, All Rights Reserved.
Address:109 Deya Rd,Changsha,hunan(410073) Tel: 0731-87002567 Email: jsjgcykx@vip.163.com
Powered by Beijing Magtech Co., Ltd.