2014 13th International Symposium on Distributed Computing and Applications to Business, Engineering and Science 2014
DOI: 10.1109/dcabes.2014.32
|View full text |Cite
|
Sign up to set email alerts
|

Low Energy-Consuming Cluster-Based Algorithm to Enforce Integrity and Preserve Privacy in Data Aggregation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Based on iPDA and CPDA algorithms, Bista et al (2012) proposed the DCIDA algorithm, which utilizes real part of complex number to protect data privacy and utilized the imaginary part to verify data integrity by introducing the concept of complex number. Guo and Ding (2014) proposed an ILC-CPDA algorithm to reduce data transmission by utilizing the LEACH protocol and simple aggregation methods. This algorithm can detect data integrity by adding homomorphic message authentication code.…”
Section: Introductionmentioning
confidence: 99%
“…Based on iPDA and CPDA algorithms, Bista et al (2012) proposed the DCIDA algorithm, which utilizes real part of complex number to protect data privacy and utilized the imaginary part to verify data integrity by introducing the concept of complex number. Guo and Ding (2014) proposed an ILC-CPDA algorithm to reduce data transmission by utilizing the LEACH protocol and simple aggregation methods. This algorithm can detect data integrity by adding homomorphic message authentication code.…”
Section: Introductionmentioning
confidence: 99%
“…Earlier contributions in the URLLC domain have suggested the use of multiuser message aggregation and joint encoding [11]. It is anticipated that the message-aggregated encoding technique could bring significant improvements onto the reliability by leveraging the coding gain and channel frequency diversitygain, at the price of decoding complexity at MCDs, medium access control (MAC) complexities, as well as security and privacy concern [12]- [14]. Nevertheless, it remains unclear how the coding gain and diversity gain behave under various constraints of the temporal DoF; and how the lower MAC protocol should be designed to support the extreme use of available DoF in the time, frequency and spatial domains.…”
Section: Introductionmentioning
confidence: 99%