PAPG: Private Aggregation Scheme based on Privacy-preserving Gene in Wireless Sensor Networks |
Zeng, Weini
(The 716TH Research Institute, China Shipbuilding Industry Corporation)
Chen, Peng (The 716TH Research Institute, China Shipbuilding Industry Corporation) Chen, Hairong (The 716TH Research Institute, China Shipbuilding Industry Corporation) He, Shiming (School of Computer and Communication Engineering, Changsha University of Science and Technology) |
1 |
Z Shi, R Sun, R Lu, Le Chen, J Chen, X Shen, “Diverse Grouping-Based Aggregation Protocol With Error Detection for Smart Grid Communications,” |
2 |
H Bao and R Lu, “A New Differentially Private Data Aggregation With Fault Tolerance for Smart Grid Communications,” |
3 |
J Won, C Ma, D Yau and N Rao, “Proactive fault-tolerant aggregation protocol for privacy-assured smart metering,” in |
4 |
J Zhao, T Jung, Y Wang and X Li., “Achieving differential privacy of data disclosure in the smart grid,” in |
5 |
Z Fu, K Ren, J Shu, X Sun, and F Huang, "Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement," |
6 |
D Djenouri, M Bagaa, “Synchronization Protocols and Implementation Issues in Wireless Sensor Networks: A Review,” |
7 |
X Guan, L Guan, X Wang, “A novel energy efficient clustering technique based on virtual hexagon for wireless sensor networks,” |
8 |
P Mukherjee, S Sen, “Comparing reputation schemes for detecting malicious nodes in sensor networks[J],” |
9 |
W Zhang, M Tran, S Zhu, |
10 |
F Ali, B Mehdi, S Hossein, |
11 |
H Zhang, P Cheng, L Shi, and J Chen, “Optimal DoS Attack Scheduling in Wireless Networked Control System,” |
12 |
M Rezvani, A Ignjatovic, E Bertino, and S Jha, “Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks,” |
13 |
L Yang, C Ding, and M Wu, “RPIDA: Recoverable Privacy-preserving Integrity-assured Data Aggregation Scheme for Wireless Sensor Networks,” |
14 |
S Zhu, S Setia, S Jajodia, |
15 |
L. Zhu, Z. Yang, M. Li, and D. Liu, "An Efficient Data Aggregation Protocol Concentrated on Data Integrity in Wireless Sensor Networks," |
16 |
T Feng, C Wang, and W Zhang, |
17 |
C Castelluccia, A Chan, E Mykletun, |
18 |
R Rivest, L Adleman, M Dertouzos, “On data banks and privacy homomorphism. Foundations of Secure Computation,” |
19 |
J Girao, D Westhoff, and M. Schneider, “CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks,” in |
20 |
Q. Zhou, G. Yang, and L. He, “A Secure-Enhanced Data Aggregation Based on ECC in Wireless sensor Networks,” |
21 |
W Zhang, C Wang, T Feng, “GP2S: Generic privacy-preservation solutions for approximate aggregation of sensor data,” in |
22 |
S Huang, S Shieh, J Tygar, “Secure encrypted-data aggregation for wireless sensor networks,” |
23 |
M Groat, W He, S Forrest, “KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks,” in |
24 |
H Zhang, Y Shu, P Cheng, and J Chen, “Privacy and Performance Trade-off in Cyber-Physical Systems,” |
25 |
I.F Akyildiz, W Su, Y Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” |
26 |
S Madden, M Franklin, J Hellerstein, and W Hong, “Tag: a tiny aggregation service for ad-hoc sensor networks,” |
27 |
J Xu, G Yang, Z Chen, Q Wang, “A survey on the privacy-preserving data aggregation in wireless sensor networks,” |
28 |
W He, X Liu, and H Nguyen, et al., “PDA: Privacy-preserving Data Aggregation in Wireless Sensor Networks,” in |
29 |
M Conti, L Zhang, S Roy, |
30 |
W Zeng, Y Lin, J Yu, S He and Lei Wang, “Privacy-preserving Data Aggregation Scheme Based on the P-Function Set in Wireless Sensor Networks,” |
31 |
T Jung, F Mao, X Li, et al., “Privacy-preserving data aggregation without secure channel: multivariate polynomial evaluation,” in |
32 |
C Castelluccia, E Mykletun, G Tsudik, “Efficient Aggregation of Encrypted Data in Wireless Sensor Networks,” in |