[1] |
李建中, 李金宝, 石胜飞 . 传感器网络及其数据管理的概念、问题与进展[J]. 软件学报, 2003,14(10): 1717-1727. LI J H , LI J B , SHI S F . Concepts,issues and advance of sensor networks and data management of sensor networks[J]. Journal of Software, 2003,14(10): 1717-1727.
|
[2] |
崔莉, 鞠海玲, 苗勇 ,等. 无线传感器网络研究进展[J]. 计算机研究与发展, 2005,42(1): 163-174. CUI L , JU H L , MIAO Y ,et al. Overview of wireless sensor networks[J]. Journal of Computer Research and Development, 2005,42(1): 163-174.
|
[3] |
DESNOYERS P , GANESAN D , LI H , SHENOY P . Presto:a predictive storage architecture for sensor networks[A]. Proc 10th Workshop on Hot Topics in Operating Systems[C]. Berkeley:USENIX Association, 2005. 23-23.
|
[4] |
ZEINALIPOUR-YAZTI D , LIN S , KALOGERAKI V ,et al. Microhash:An efficient index structure for flash-based sensor devices[A]. Proc 4th USENIX Conf.on File and Storage Technologies (FAST2005)[C]. 2005. 31-44.
|
[5] |
SHENG B , LI Q , MAO W . Data storage placement in sensor networks[A]. Proc 7th ACM Inte Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc2006)[C]. 2006. 344-355.
|
[6] |
SHENG B , TAN CC , LI Q , MAO W . An approximation algorithm for data storage placement in sensor networks[A]. Proc Inte Conf on Wireless Algorithms,Systems and Applications (Wasa 2007)[C]. 2007. 71-78.
|
[7] |
HEIDEMANN J ,et al. Building efficient wireless sensor networks with low-level naming[A]. 18th ACM Symposium on Operating Systems Principles[C]. October 2001. 21-24.
|
[8] |
INTANAGONWIWAT C , GOVINDAN R , ESTRIN D . Directed diffusion:a scalable and robust communication paradig for sensor networks[A]. Proc Annual Inte Conf on Mobile Computing and Networking[C]. New York: ACM Press, 2000. 56-67.
|
[9] |
SHENG B , LI Q . Verifiable privacy-preserving range query in two-tiered sensor networks[A]. Proc IEEE Inte Conf on Computer Communications (INFOCOM2008)[C]. 2008. 46-50.
|
[10] |
SHI J , ZHANG R , ZHANG Y . Secure range queries in tiered sensor networks[A]. Proc IEEE Inte Conf on Computer Communications (INFOCOM2009)[C]. 2009. 945-953.
|
[11] |
ZHANG R , SHI J , ZHANG Y . Secure multidimensional range queries in sensor networks[A]. Proc ACM Inte Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc2009)[C]. 2009. 197-206.
|
[12] |
CHEN F , LIU A X . SafeQ:Secure and efficient query processing in sensor networks[A]. Proc IEEE Inte Conf on Computer Communications(INFOCOM 2010)[C]. 2010. 2642-2650.
|
[13] |
PRZYDATEK B , SONG D , PERRIG A . SIA:secure information aggregation in sensor networks[A]. Proc Inte Embedded Networked Sensor Systems (SenSys’03)[C]. 2003. 255-265.
|
[14] |
WANG C , WANG G , ZHANG W , FENG T . Reconciling privacy preservation and intrusion detection in sensory data aggregation[A]. Proc IEEE Inte Conf on Computer Communications (INFOCOM 2011)[C]. 2011. 336-340.
|
[15] |
CASTELLUCCIA C , MYKLETUN E , TSUDIK G . Efficient aggregation of encrypted data in wireless sensor networks[A]. Proc Annual Inte Conf on Mobile and Ubiquitous Systems:Networking and Services[C]. San Diego,CA,USA, 2005. 109-117.
|
[16] |
YAO Y , XIONG N , PARK J ,et al. Privacy-preserving max/min query in two-tiered wireless sensor networks[J]. Computer and Mathematics with Application, 2012,2: 1-8.
|
[17] |
GOLDREICH O . Foundations of Cryptography:Vol.2,Basic Applications[M]. Cambridge University Press, New York,NY,USA, 2004.
|
[18] |
CHAN H , PERRIG A , SONG D . Secure hierarchical in-network aggregation in sensor networks[A]. Proceedings of the 13th ACM conference on Computer and communications security[C]. New York: ACM Press, 2006: 278-287.
|
[19] |
YANG Y , WANG X , ZHU S ,et al. Sdap:a secure hop-by-hop data aggregation protocol for sensor networks[J]. ACM Transactions on Information and System Security, 2008,11(4): 1-43.
|
[20] |
ISKANDER M K , Lee A J , Mossé D . Privacy and robustness for data aggregation in wireless sensor networks[A]. Proceedings of the 17th ACM Conference on Computer and Communications Security[C]. New York: ACM Press, 2010. 699-701
|
[21] |
CHENG J , YANG H , WONG S H ,et al. Design and implementation of cross-domain cooperative firewall[A]. Proc.International Conference on Network Protocols[C]. Piscataway:IEEE, 2007. 284-293.
|
[22] |
LIU A X , CHEN F . Collaborative enforcement of firewall policies in virtual private networks[A]. Proceedings of the Twenty-Seventh ACM Symposium on Principles of Distributed Computing[C]. New York: ACM Press, 2008. 95-104.
|
[23] |
CHANG Y K . Fast binary and multiway prefix searches for packet forwarding[J]. Computer Networks, 2007,51(3): 588-605.
|
[24] |
BRODER A , MITZENMACHER M . Network applications of Bloom filters:A survey[J]. Internet Mathematics, 2004,11(4): 485-509.
|
[25] |
Intel lab data[EB/OL]. .
|