[1] |
杨庚, 许健, 陈伟 , 等 . 物联网安全特征与关键技术[J]. 南京邮电大学学报(自然科学版), 2010,30(4): 20-29. YANG G , XU J , CHEN W , et al. Security characteristic and technol-ogy in the Internet of things[J]. Journal of Nanjing University of Posts and Telecommunications(Natural Science), 2010,30(4): 20-29.
|
[2] |
李仁发, 谢勇, 李蕊 , 等 . 信息-物理融合系统若干关键问题综述[J]. 计算机研究与发展, 2012,49(6): 1149-1161. LI R F , XIE Y , LI R . Survey of cyber-physical systems[J]. Journal of Computer Research and Development, 2012,49(6): 1149-1161.
|
[3] |
范永健, 陈红, 张晓莹 . 无线传感器网络数据隐私保护技术[J]. 计算机学报, 2012,35(6): 1131-1146. FANG Y J , CHEN H , ZANG X Y . Data privacy preservation in wire-less sensor networks[J]. Chinese Journal of Computers, 2012,35(6): 1131-1146.
|
[4] |
HE W , LIU X , NGUYEN H , et al. PDA:privacy-preserving data aggregation in wireless sensor networks[A]. Proceedings INFOCOM 2007:26th IEEE International Conference on Computer Communica-tions[C]. Piscataway:IEEE Press, 2006.165-168.
|
[5] |
杨庚, 王安琪, 陈正宇 , 等 . 一种低耗能的数据融合隐私保护算法[J]. 计算机学报, 2011,34(5): 792-800. YANG G , WANG A Q , CHEN X Y , et al. An energy_saving privacy-preserving data aggregation algorithm[J]. Chinese Journal of Com-puters, 2011,34(5): 792-800.
|
[6] |
周强, 杨庚, 李森 , 等 . 一种可检测数据完整性的隐私数据融合算法[J]. 电子与信息学报, 2013,35(6): 1277-1283. ZHOU Q , YANG G , LI S , et al. An integrity-checking private data ag-gregation algorithm[J]. Journal of Electronics &Information Tech-nology, 2013,35(6): 1277-1283.
|
[7] |
CASTELLUCCIA C , CHAN A , MYKLETUN E , et al. Efficient and provably secure aggregation of encrypted data in wireless sensor net-works[J]. ACM Transactions on Sensor Networks. 2009,5(3): 1-36.
|
[8] |
FENG T , WANG C , ZHANG W , et al. Confidentiality protection schemes for data aggregation in sensor networks[A]. Proceedings INFOCOM 2008:27th IEEE International Conference on Computer Communications[C]. Piscataway:IEEE Press, 2008.131-146.
|
[9] |
CONTI M , ZHANG L , ROY S , et al. Privacy-preserving robust data aggregation in wireless sensor networks[J]. Security and Communica-tion Networks, 2009,2(2): 195-213.
|
[10] |
曾玮妮, 林亚平, 何施茗 , 等 . 无线传感器网络中基于隐私保护元的数据聚合机制[J]. 通信学报, 2012,10(6): 16-25. ZENG W N , LIN Y P , HE S M , et al. A data aggregation scheme based on privacy- preserving element for wireless sensor networks[J]. Journl on Communictions, 2012,10(6): 16-25.
|
[11] |
JUNG T , MAO F , LI X , et al. Privacy-preserving data aggregation with-out secure channel:multivariate polynomial evaluation[A]. Proceedings INFOCOM 2013:32th IEEE International Conference on Computer Communications[C]. Piscataway:IEEE Press, 2013.2634-2642.
|
[12] |
GREUNEN J , RABAEY J . Lightweight time synchronization for sensor networks[A]. Proceedings of the Second ACM International Workshop on Wireless Sensor Networks and Applications,WSNA 2003[C].Association for Computing Machinery, 2003.11-19.
|
[13] |
ZHANG W , WANG C , FENG T . GP2 S:Generic privacy-preservation solutions for approximate aggregation of sensor data[A]. Proceedings of the 6th Annual IEEE International Conference on Pervasive Com-puting and Communications,PerCom 2008[C]. Hongkong,China, 2008.
|
[14] |
GROAT M , HE W , FORREST S . KIPDA:k-indistinguishable pri-vacy-preserving data aggregation in wireless sensor networks[A]. Pro-ceedings INFOCOM 2011:30th IEEE International Conference on Com-puter Communications[C]. Piscataway:IEEE Press, 2011.2024-2032.
|
[15] |
ZHANG W , TRAN M N , ZHU S , et al. A random perturbation-based scheme for pairwise key establishment in sensor networks[A]. Mobi-Hoc'07:Proceedings of the Eighth ACM International Symposium on Mobile Ad Hoc Networking and Computing[C]. New York,Associa-tion for Computing Machinery, 2007.90-99.
|
[16] |
ALI F , MEHDI B , HOSSEIN S , et al. A high performance and intrin-sically secure key establishment protocol for wireless sensor net-works[J]. Computer Networks, 2011,55(8): 1849-1863.
|
[17] |
MADDEN S , FRANKLIN M , HELLERSTEIN J , et al. Tag:a tiny aggregation service for ad-hoc sensor networks[J]. SIGOPS Oper yst Rev, 2002,36:131-146.
|
[18] |
GOBRIEL S , KHATTAB S , MOSSE D , et al. Ridesharing:fault tol-erant aggregation in sensor networks using corrective actions[A]. Pro-ceeding of the Sensor and Ad Hoc Communications and Networks,2006.SECON '06[C]. Reston,VA, 2006.
|
[19] |
PERRIG A , SZEWCZYK R , WEN V , et al. SPINS:security protocols for sensor networks[A]. Proceedings of the Seventh Annual Interna-tional Conference on Mobile Computing and Networks[C]. Rome,Italy, 2001.
|
[20] |
WANDER A S , GURA N , EBERLE H , et al. Energy analysis of pub-lic-key cryptography for wireless sensor networks[A]. Proceedings -Third IEEE International Conference on Pervasive Computing and Communications,PerCom 2005[C]. Kauai Island,HI,United States, 2005.
|