Asian Journal of Information Technology
Year:
2013
Volume:
12
Issue:
7
Page No.
208 - 216
References
Ba, M., I. Niang, B. Gueye and T. Noel, 2010. A deterministic key management scheme for securing cluster-based sensors networks. Proceedings of the 8th International Conference on Embedded and Ubiquitous Computing, December 11-13, 2010, Hong Kong, pp: 422-427.
Bagaa, M., Y. Challal, A. Ouadjaout, N. Lasla and N. Badache, 2012. Efficient data aggregation with in-network integrity control for WSN. J. Parallel Distrib. Comput., 72: 1157-1170.
CrossRef | Direct Link | Bo, S., X. Shan, K. Wu and Y. Xiao, 2013. Anomaly detection based secure in-network aggregation for wireless sensor networks. IEEE Syst. J., 7: 13-25.
CrossRef | Direct Link | De Dieu, I.J., N. Assouma, M. Muhamad, W. Jin and S. Lee, 2012. Energy-efficient secure path algorithm for wireless sensor networks. Int. J. Distrib. Sensor Networks, Vol. 2012. 10.1155/2012/751784
Fukabori, T., H. Nakayama, H. Nishiyama, N. Ansari and N. Kato, 2010. An Efficient data aggregation scheme using degree of dependence on clusters in WSNs. Proceedings of the IEEE International Conference on Communications, May 23-27, 2010, Cape Town, pp: 1-5.
Harjito, B., S. Han, V. Potdar, E. Chang and M. Xie, 2010. Secure communication in wireless multimedia sensor networks using watermarking. Proceedings of the 4th IEEE International Conference on Digital Ecosystems and Technologies, April 13-16, 2010, Dubai, pp: 640-645.
Hong, S.H., J.M. Park and J.M. Gil, 2013. Performance evaluation of a simple cluster-based aggregation and routing in wireless sensor networks. Int. J. Distrib. Sensor Networks, Vol. 2013. 10.1155/2013/501594
Huang, L., J. Li and H. Kameda, 2010. A secure routing protocol for cluster-based wireless sensor networks using ID-based digital signature. Proceedings of the IEEE Global Telecommunications Conference, December 6-10, 2010, Miami, FL., USA., pp: 1-5.
Huang, S.I., S. Shieh and J.D. Tygar, 2010. Secure encrypted-data aggregation for wireless sensor networks. Wireless Networks, 16: 915-927.
CrossRef | Direct Link | Lei, Z., H. Zhang, M. Conti, R. di Pietro, S. Jajodia and L.V. Mancini, 2010. Reverse tree-based key routing: Robust data aggregation in wireless sensor networks. Proceedings of the 10th International Conference on Computer and Information Technology, June 29-July-1, 2010, Bradford, pp: 910-915.
Lin, X., R. Lu and X. Shen, 2010. MDPA: Multidimensional privacy-preserving aggregation scheme for wireless sensor networks. Wireless Commun. Mobile Comput., 10: 843-856.
CrossRef | Direct Link | Mpitziopoulos, A., D. Gavalas, C. Konstantopoulos and G. Pantziou, 2010. CBID: A scalable method for distributed data aggregation in WSNs. Int. J. Distrib. Sensor Networks, 10.1155/2010/206517
Ozdemir, S. and H. Cam, 2010. Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Trans. Network, 18: 736-749.
CrossRef | Direct Link | Ozdemir, S. and Y. Xiao, 2011. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Comput. Networks, 55: 1735-1746.
CrossRef | Direct Link | Sicari, S., L.A. Grieco, G. Boggia and A. Coen-Porisini, 2012. DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. J. Syst. Software, 85: 152-166.
CrossRef | Direct Link | Su, T.S., M.W. Huang, W.S. Li and W.S. Hsieh, 2012. Aggregation scheme with secure hierarchical clustering for wireless sensor networks. Int. J. Distrib. Sensor Networks, Vol. 2012. 10.1155/2012/162347
Wang, J., L. Zheng, L. Zhao and D. Tian, 2012. LEACH-based security routing protocol for WSNs. Adv. Comput. Sci. Inform. Eng., 169: 253-258.
CrossRef | Direct Link | Yang, G., S. Li, X. Xu, H. Dai and Z. Yang, 2013. Precision-enhanced and encryption-mixed privacy-preserving data aggregation in wireless sensor networks. Int. J. Distrib. Sensor Networks, Vol. 2013. 10.1155/2013/427275
Zhu, L., Z. Yang, M. Wang and M. Li, 2013. ID list forwarding free confidentiality preserving data aggregation for wireless sensor networks. Int. J. Distrib. Sensor Networks, Vol. 2013. 10.1155/2013/241261
Zhu, W.T., F. Gao and Y. Xiang, 2011. A secure and efficient data aggregation scheme for wireless sensor networks. Concurrency Comput.: Pract. Exp., 23: 1414-1430.
CrossRef | Direct Link |