[1]Yick J, Mukherjee B, Ghosal D. Wireless Sensor Network Survey[M]. NorthHolland: Elsevier, 2008: 22922330[2]侯小华, 胡文东, 项红雨, 等. 基于zigbee无线传感器网络技术的患者体温检测系统设计[J]. 医疗卫生装备, 2010, 31(2): 6566[3]Pottie G J, Kaiser W J. Wireless integrated network sensors[J]. Wireless Integrated Network Sensors Next Generation, 1999, 43(5): 5158[4]Akyildiz I F, Su Weilian, Sankarasubramaniam Y, et al. A survey on sensor networks[J]. IEEE Communication Magezine, 2002, 40(8): 102114[5]刘明, 龚海刚, 毛莺池, 等. 高效节能的传感器网络数据收集和聚合协议[J]. 软件学报, 2005, 16(12): 21062116[6]曹晓梅, 刘大伟. 基于复数的隐私保护数据融合方案[J]. 计算机科学, 2013, 40(S1): 311314[7]He Daojing, Bu Jiajun, Zhu Sencun, et al. Distributed privacypreserving access control in a singleowner multiuser sensor network[C] Proc of the 30th IEEE Int Conf on Computer Communications. Piscataway, NJ: IEEE, 2011: 331335[8]He Wenbo, Liu Xue, Nguyen H, et al. PDA: Privacypreserving data aggregation in wireless sensor networks[C] Proc of IEEE Conf on Computer Communications. Piscataway, NJ: IEEE, 2007: 20452053[9]He Wenbo, Nguyen H, Liu Xu, et al. iPDA: An integrityprotecting private data aggregation scheme for wireless sensor networks[C] Proc of IEEE Military Communications Conf. Piscataway, NJ: IEEE, 2008: 17[10]杨庚, 王安琪, 陈正宇, 等. 一种低耗能的数据融合隐私保护算法[J]. 计算机学报, 2011, 34(5): 792800[11]Liu Chenxu, Liu Yun, Zhang Zhenjiang, et al. High energyefficient and privacypreserving secure data aggregation for wireless sensor networks[J]. International Journal of Communication Systems, 2013, 26(3): 380394[12]Yang Geng, Li Sen, Xu Xiaolong, et al. Precisionenhanced and encryptionmixed privacypreserving data aggregation in wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2013 (1): 333351[13]Boneh D, Goh E J, Nissim K. Evaluating formulas on ciphertexts[G] LNCS 3378. Berlin: Springer, 2005: 325341[14]Choi Y, Lee D, Kim J, et al. Security enhanced user authentication protocol for wireless sensor networks using elliptic curves cryptography[J]. Sensors, 2014, 14(6): 1008110106[15]Bahi J M, Guyeux C, Makhoul A. Efficient and robust secure aggregation of encrypted data in sensor networks[C] Proc of the 4th Int Conf on Sensor Technologies and Applications. Piscataway, NJ: IEEE, 2010: 472477[16]Ozdemir S, Xiao Yang. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks[J]. Computer Networks, 2011, 55(8): 17351746[17]Zhou Qiang, Yang Geng, He Liwne. A secureenhanced data aggregation based on ECC in wireless sensor networks[J]. Sensors, 2014, 14(4): 67016721李超
|