[1]
Intanagonwiwat, C Govindan, R Estrin, D Heidemann. Directed diffusion for wireless sensor networking[J]. In IEEE/ ACM trans- actions on networking, 2003, 11(1): 2–16.
DOI: 10.1109/tnet.2002.808417
Google Scholar
[2]
I. N. Al-Karaki, R. UI-Mustafa, A. E. Kamal. Data aggregation in wireless sensor networks-exact and approximate algorithms, High Performance Switching and Routing. Iowa, USA, 2004: 241– 245.
DOI: 10.1109/hpsr.2004.1303478
Google Scholar
[3]
T. Aonishi, T. Matsuda, et al. Impact of aggregation efficiency on GIT-routing for wireless sensor networks[C], Proc of the 2006 International Conference Workshops on Parallel Processing. Ohio, USA, 2006:151–158.
DOI: 10.1109/icppw.2006.41
Google Scholar
[4]
L. A. Villas, D. L. Guidoni, R. B. Ara´ujo, A. Boukerche. A scalable and dynamic data aggregation aware routing protocol for wireless sensor networks, in proc of the 13th ACM international con- ference on Modeling, analysis, and simulation of wireless and mobile systems. USA, IEEE Society Press, 2010: 110–117.
DOI: 10.1145/1868521.1868540
Google Scholar
[5]
J. Domingo-Ferrer, A provably secure additive and multiplicative privacy homomorphism, in: Proceedings of the 5th International Conference on Information Security, ISC '02, 2002,471–483.
DOI: 10.1007/3-540-45811-5_37
Google Scholar
[6]
Acharya, M, Girao, J, Secure comparison of encrypted data in wireless sensor networks, In proc of the 3rd international symposium on modelling and optimization in mobile, ad hoc, and wireless networkks. Trentino, Italy, 2005: 47–53.
DOI: 10.1109/wiopt.2005.44
Google Scholar
[7]
CAM H,OZDEMIR S. Energy-efficient security protocol for wireless sensor networks, Proceedings of IEEE VTC Fall 2003 Conference. New York, USA, 2003:2981- 2984.
DOI: 10.1109/vetecf.2003.1286170
Google Scholar
[8]
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar. Secure encrypted- data aggregation for Wireless Sensor Network. Springer Wireless Neworks, 2010(16):915-927.
DOI: 10.1007/s11276-009-0177-y
Google Scholar