2015
DOI: 10.1109/cc.2015.7112038
|View full text |Cite
|
Sign up to set email alerts
|

A survey on the privacy-preserving data aggregation in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
30
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 46 publications
(30 citation statements)
references
References 30 publications
(36 reference statements)
0
30
0
Order By: Relevance
“…In our model, in order to maximize the lifetime of a network, the network may select i CCS until the energy consumption of i CCS reaches the threshold. Formula (16) and formula (17) describe the update method of global pheromone:…”
Section: Energy Consumption Balancing Inside the Cooperative Coveragementioning
confidence: 99%
See 2 more Smart Citations
“…In our model, in order to maximize the lifetime of a network, the network may select i CCS until the energy consumption of i CCS reaches the threshold. Formula (16) and formula (17) describe the update method of global pheromone:…”
Section: Energy Consumption Balancing Inside the Cooperative Coveragementioning
confidence: 99%
“…In formula (16) and formula 17, we denote Q as the sum of pheromone for an ant. best L is the length of the best path and RHQ is the attenuation rate of pheromone.…”
Section: Energy Consumption Balancing Inside the Cooperative Coveragementioning
confidence: 99%
See 1 more Smart Citation
“…Such technologies as symmetric encryption, elliptic curve encryption, and data segmentation have been developed for privacy protection during data acquisition in wireless sensor networks [7]. Based on blind signature technology, Xu et al [7] proposed a data collection framework with privacy protection capability in smart grids based on a key distribution framework that effectively protects the user's private data. However, the above privacy protection frameworks have limitations and security defects, such as key propagation and a large overhead for encryption and decryption calculations.…”
Section: Introductionmentioning
confidence: 99%
“…The node senses, and then forward the sensed data into the communication network through a gateway. Nodes are resource-limited equipment regarding memory and computational capabilities and also energy capacity [4].…”
Section: Introductionmentioning
confidence: 99%