2016 International Conference on Information Science (ICIS) 2016
DOI: 10.1109/infosci.2016.7845340
|View full text |Cite
|
Sign up to set email alerts
|

Symmetric concealed data aggregation techniques in wireless sensor networks using Privacy Homomorphism: A review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Use of Bilinear Pairings in loss-free aggregation is proposed by [7][8][9][10]. Cryptographic aggregation using Symmetric Keys are described [11][12][13][14] to decrease the computational overhead associated with ECC. In a few schemes, Filter based techniques are used to prevent the adversarial attacks [15][16][17].…”
Section: B Chinese Remainder Theorem For Secure Data Aggregationmentioning
confidence: 99%
See 2 more Smart Citations
“…Use of Bilinear Pairings in loss-free aggregation is proposed by [7][8][9][10]. Cryptographic aggregation using Symmetric Keys are described [11][12][13][14] to decrease the computational overhead associated with ECC. In a few schemes, Filter based techniques are used to prevent the adversarial attacks [15][16][17].…”
Section: B Chinese Remainder Theorem For Secure Data Aggregationmentioning
confidence: 99%
“…The CH already knows D(1) specified by (10). Then, it calculates w(1) using (12) in the time slot DATS (Data Aggregation Time Slot). Now w(1) is the augmented aggregate of C(1) where g(1) acts as the signature of the CH.…”
Section: A Aggregation and Signature Embedding (Encoding) At Ch Using...mentioning
confidence: 99%
See 1 more Smart Citation
“…We speculate that certain sensitivity knots were picked influentially as fact acquisition along with the knots among couple of continues fact generators are named promoting knots as they promote message. In order to expose erroneous message inoculated by fact acquisition during fact acquisition, as a result nearby knots of the fact acquisition(named observing knots) too operate fact acquisition and also operate MACs for the acquisition message to provide their team to check the message afterwards [2]. DAV equally gives message privacy as messages were promoted among fact acquisitions.…”
Section: Introductionmentioning
confidence: 99%
“…(1) First team is created by the present as well as promoted fact generators. (2). N teams were created by the observing knots of the present fact acquisition, Finally (3).…”
mentioning
confidence: 99%