2011
DOI: 10.1016/j.comnet.2011.01.006
|View full text |Cite
|
Sign up to set email alerts
|

Integrity protecting hierarchical concealed data aggregation for wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
75
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 101 publications
(75 citation statements)
references
References 22 publications
0
75
0
Order By: Relevance
“…Fully homomorphic technique allows both addition and multiplication on encrypted data. Let us consider D () and E () denotes decryption and encryption, respectively [10]. K u be the public key and K r is the private key and Q is the data set, then (1) and (2) are the equations for multiplicative homomorphic and additive homomorphic:…”
Section: Shahina and Vaidehimentioning
confidence: 99%
See 1 more Smart Citation
“…Fully homomorphic technique allows both addition and multiplication on encrypted data. Let us consider D () and E () denotes decryption and encryption, respectively [10]. K u be the public key and K r is the private key and Q is the data set, then (1) and (2) are the equations for multiplicative homomorphic and additive homomorphic:…”
Section: Shahina and Vaidehimentioning
confidence: 99%
“…Ozdemir proposes an IHCA [10] method. Using a key encryption, the BS classifies the aggregated data.…”
Section: Integrity Protecting Hierarchical Concealed Data Aggregationmentioning
confidence: 99%
“…Energy consumption is reduced by scheduling some of the SNs to sleep periodically. (Ozdemir and Cam, 2010) combined a false data detection module with data aggregation for confidential transmission in WSNs (Ozdemir and Xiao, 2011). The main source of false data is compromised SNs which inject false data during aggregation and forwarding of data.…”
Section: Related Workmentioning
confidence: 99%
“…The network architecture consists of 500 nodes in a simulated area of 10003 * 1000 m. The nodal velocity is varied from 5 to 30 m/s. The enhanced DAO-LEACH protocol is analyzed with existing methods like SCAR (Hong et al, 2013), DyDAP (Sicari et al, 2012), DAA (Ozdemir and Cam, 2010), IPHCDA protocol (Ozdemir and Xiao, 2011), SEDAN (Bagaa et al, 2012), DKS-LEACH (Ba et al, 2010) and ESPA (Dieu et al, 2012) in terms of the following parameters.…”
Section: Performance Evaluationmentioning
confidence: 99%
“…During the calculation process, frequent encryption and decryption operations increase the overall operation time (Zhou, Yang and He, 2014;Yang et al, 2008). In addition, in some special circumstances, hackers can use forged data, identity or Trojan attacks to shorten the lifetime of the wireless sensor data transmission system, increase energy consumption and even paralyze the entire network (Chan, 2007;Kumar and Dutta, 2015;Shakshuki Malik and Denko, 2008;Tang et al, 2011;Ozdemir and Xiao, 2011).…”
Section: Introductionmentioning
confidence: 99%