2007 IEEE/ACS International Conference on Computer Systems and Applications 2007
DOI: 10.1109/aiccsa.2007.370871
|View full text |Cite
|
Sign up to set email alerts
|

On Secure Consensus Information Fusion over Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0
1

Year Published

2009
2009
2021
2021

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 9 publications
0
3
0
1
Order By: Relevance
“…To our knowledge, secure data fusion in wireless sensor networks have not been widely researched, though there are several protocols recently proposed in the literature. Blind Information Fusion Framework (BIFF) is proposed in [ 14 ]. In BIFF, the data are transformed from normal space to the anonymous space and can't be deduced once they are fused.…”
Section: Related Workmentioning
confidence: 99%
“…To our knowledge, secure data fusion in wireless sensor networks have not been widely researched, though there are several protocols recently proposed in the literature. Blind Information Fusion Framework (BIFF) is proposed in [ 14 ]. In BIFF, the data are transformed from normal space to the anonymous space and can't be deduced once they are fused.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we present some important work on clustering algorithms for WSNs [6][7][8][9][10][11], decentralized reputation systems that can be used in WSNs [13][14][15][16][17][18][19][20][21] and information fusion algorithms [22][23][24][25][26].…”
Section: Related Workmentioning
confidence: 99%
“…Some protocols for secure information fusion have been proposed in the literature. A secure information fusion framework named Blind Information Fusion Framework (BIFF) was proposed in [23]. In BIFF, the sensor nodes are not aware of the actual information they are processing, but the Framework converges to the intended result(s).…”
Section: Related Workmentioning
confidence: 99%
“…Στη μελέτη [26], ένα μερικώς ομομορφικό σύστημα κρυπτογράφησης (Partially Homomorphic Encryption) χρησιμοποιείται, προκειμένου να διαφυλαχθεί η ιδιωτικότητα με πλήρως αποκεντρωμένο τρόπο, παρέχοντας εγγυήσεις για συναίνεση στην ακριβή τιμή χωρίς την απαίτηση οι κόμβοι να αποκαλύπτουν την εσωτερική τους κατάσταση στους γείτονές τους. Αντίστοιχα, στις εργασίες [27] και [28] αντιμετωπίζεται το πρόβλημα της ύπαρξης κακόβουλων κόμβων που σκοπεύουν όχι μόνο να εκτιμήσουν τις αρχικές καταστάσεις άλλων κόμβων αλλά και να διαταράξουν ή να αποτρέψουν τη συναίνεση εισάγοντας ψευδή δεδομένα.…”
Section: κατανεμημένος υπολογισμός μέσου όρουunclassified