[1]
HUI LI. Study on the Security of Wireless Sensor Network. Shanghai Jiaotong University (2007).
Google Scholar
[2]
B. LAI S K, AND I. VERBAUWHEDE. Scalable session key construction protocol for wireless sensor networks. In IEEE Workshop on Large Scale RealTime and Embedded Systems(LARTES), Austin, Texas(2002).
Google Scholar
[3]
V.GLIGOR L E A. A Key Management Scheme for Distributed Sensor Networks. In ACM CCS, Washington DC(2002).
Google Scholar
[4]
NING D L A P. Location-based pairwise key establishment for static sensor networks. In 1st ACM Workshop on Security of Ad Hoc and Sensor Networks(2003).
DOI: 10.1145/986858.986869
Google Scholar
[5]
C. BLUNDO A S, A. HERZBERG, AND S. KUTTEN. Perfectly-secure key distribution for dynamic conferences. In Crypto 92(1992).
DOI: 10.1007/3-540-48071-4_33
Google Scholar
[6]
A. MAHIMKAR T S R. SecureDAV: A Secure Data Aggregation and Verification Protocol for Sensor Networks. Proceedings of IEEE Global Telecommunications Conference(Globecom), Dallas, TX, USA(2004).
DOI: 10.1109/glocom.2004.1378395
Google Scholar
[7]
C. CASTELLUCCIA E M A G T. Efficient Aggregation of Encrypted Data in Wireless Sensor Networks. ACM/IEEE Mobiquitous Conference, San Diego, USA(2005).
Google Scholar
[8]
E. MYKLTUN J G A D W. Public key based cryptoschemes for data concealment in wireless sensor networks. In IEEE International Conference on Communications, Turkey(2006).
DOI: 10.1109/icc.2006.255111
Google Scholar
[9]
PEI Q Q, SHEN Y L, MA J F. Survey of Wireless Sensor Networks Seurity Techniques. Journal on Communications. Vol. 08(2007), pp.113-122.
Google Scholar
[10]
CASTELLUCCIA C, CHAN A C F, MYKLETUN E, et al. Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks [J]. Acm Transcations on Sensor Networks, Vol. 5(2009), pp.1-36.
DOI: 10.1145/1525856.1525858
Google Scholar
[11]
OZDEMIR S, XIAO Y. Secure data aggregation in wireless sensor networks: A comprehensive overview. Computer Network, Vol. 53(2009), pp.2022-2037.
DOI: 10.1016/j.comnet.2009.02.023
Google Scholar
[12]
WU K, DREEF D, SUN B, et al. Secure data aggregation without persistent cryptographic operations in wireless sensor networks. Ad Hoc Network, Vol. 5(2007), pp.100-111
DOI: 10.1016/j.adhoc.2006.05.009
Google Scholar