[1] Chen Y P, Liestman A L, Liu J, et al. A Hierarchical Energy-efficient Framework for Data Aggregation in Wireless Sensor Networks [J]. IEEE Trans on Vehicular Technology, 2006, 55(3): 789-796.
[2] Considine J, Li F, Kollios G, et al. Approximate Aggregation Techniques for Sensor Databases [C]//Proc of the 20th International Conference on Data Engineering. Washington: IEEE, 2004: 449-455.
[3] Villas L A, Guidoni D L, Ara'ujo R B, et al. A Scalable and Dynamic Data Aggregation Aware Routing Protocol for Wireless Sensor Networks [C]//Proc of the 13th ACM International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems. USA: Springer, 2010: 110-117.
[4] Faye S, Myoupo J F. An Ultra Hierarchical Clustering-Based Secure Aggregation Protocol for Wireless Sensor Networks[J]. Advances in Information Sciences and Service Sciences, 2011, 3(9): 309-319.
[5] Chan Haowen, Perrig A, Przydatek B, et al. SIA: Secure Information Aggregation in Sensor Networks [J]. Journal of Computer Security, 2007, 15(1): 69-102.
[6] Jariwala V, Jinwala D. Evaluating Homomorphic Encryption Algorithms for Privacy in Wireless Sensor Networks [J]. International Journal of Advancements in Computing Technology, 2011, 3(6): 215-223.
[7] Cam H,Ozdemir S. Energy-efficient Security Protocol for Wireless Sensor Networks[C]//Proceedings of IEEE VTC Fall 2003 Conference. New York: IEEE Society, 2003: 2981-2984.
[8] Huang S I, Shieh S, Tygar J D. Secure Encrypted-data Aggregation for Wireless Sensor Network[J]. Springer Wireless Networks, 2010(16): 915-927.
[9] Ozdemir S, am H, et al. Integration of False Data Detection with Data Aggregation and Confidential Transmission in Wireless Sensor Networks [J]. IEEE/ACM Trans Netw, 2011, 18(3): 736-749.
[10] Perrig A, Szewczyk R, Tygar J, et al. SPINS: Security Protocols for Sensor Networks[J]. ACM Wireless Network, 2002, 8(5): 521-534.
[11] 杜志强, 沈玉龙, 马建峰, 等. 一种实用的传感器网络广播认证方案[J]. 西安电子科技大学学报, 2010, 37(2): 305-310.
Du Zhiqiang, Shen Yulong, Ma Jianfeng, et al. Practical Broadcast Authentication Protocol for Sensor Networks[J]. Journal of Xidian University, 2010, 37(2): 305-310.
[12] 孙纪敏, 沈玉龙, 裴庆祺, 等. 传感器网络异常时间同步数据过滤算法[J]. 西安电子科技大学学报, 2008, 35(5): 910-915.
Sun Jimin, Shen Yulong, Pei Qingqi, et al. Abnormal Time Synchronization Data Filter Algorithm in Sensor Networks [J]. Journal of Xidian University, 2008, 35(5): 910-915.
[13] Schneier B. Description of a New Variable-Length Key, 64-bit Block Cipher(Blowfish)[C]//Fast Software Encryption, Cambridge Security Workshop. London: Springer-Verlag, 1993: 191-204.
[14] Chan H, Perrig A. ACE: an Emergent Algorithm for Highly Uniform Cluster Formation [J]. LNCS, 2004, 2(2920): 154-171. |