Data aggregation is an efficient mechanism widely used in wireless sensor networks (WSN) to collect statistics about data of interests. However, the shared-medium nature of communication makes the WSNs are vulnerable to eavesdropping and packet tampering/injection by adversaries. Hence, how to protect data privacy and data integrity are two major challenges for data aggregation in wireless sensor networks. In this paper, we present iPDA??????an integrity-protecting private data aggregation scheme. In iPDA, data privacy is achieved through data slicing and assembling technique; and data integrity is achieved through redundancy by constructing disjoint aggregation paths/trees to collect data of interests. In iPDA, the data integrity-protectio...
Wireless sensor networks are always deployed in remote and hostile environments to gather sensitive ...
To improve the data aggregation privacy protection scheme in wireless sensor network (WSN), a new sc...
Wireless sensor network can be applied to both abom�inable and military environments. A primary goal...
Data aggregation is an efficient mechanism widely used in wireless sensor networks (WSN) to collect ...
A wireless sensor network (WSN) is an ad-hoc network composed of small sensor nodes deployed in larg...
Wireless sensor networks (WSNs) were originally motivated by military applications, and are becoming...
Data aggregation is an efficient mechanism to collect statistics of data in wireless sensor networks...
Abstract — Providing efficient data aggregation while preserv-ing data privacy is a challenging prob...
Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor dat...
Wireless sensor network can be applied to both abominable and military environments. A primary goal ...
Wireless sensor network can be applied to both abominable and military environments. A primary goal ...
An important topic addressed by the wireless sensor networks community over the last several years i...
Data aggregation is an efficient mechanism to collect statistics of data in wireless sensor networks...
In-network data aggregation in wireless sensor networks (WSNs) is a technique aimed at reducing the ...
© 2014 IEEE. Privacy-preserving data aggregation is a kind of fundamental and essential algorithm fo...
Wireless sensor networks are always deployed in remote and hostile environments to gather sensitive ...
To improve the data aggregation privacy protection scheme in wireless sensor network (WSN), a new sc...
Wireless sensor network can be applied to both abom�inable and military environments. A primary goal...
Data aggregation is an efficient mechanism widely used in wireless sensor networks (WSN) to collect ...
A wireless sensor network (WSN) is an ad-hoc network composed of small sensor nodes deployed in larg...
Wireless sensor networks (WSNs) were originally motivated by military applications, and are becoming...
Data aggregation is an efficient mechanism to collect statistics of data in wireless sensor networks...
Abstract — Providing efficient data aggregation while preserv-ing data privacy is a challenging prob...
Many wireless sensor network (WSN) applications require privacy-preserving aggregation of sensor dat...
Wireless sensor network can be applied to both abominable and military environments. A primary goal ...
Wireless sensor network can be applied to both abominable and military environments. A primary goal ...
An important topic addressed by the wireless sensor networks community over the last several years i...
Data aggregation is an efficient mechanism to collect statistics of data in wireless sensor networks...
In-network data aggregation in wireless sensor networks (WSNs) is a technique aimed at reducing the ...
© 2014 IEEE. Privacy-preserving data aggregation is a kind of fundamental and essential algorithm fo...
Wireless sensor networks are always deployed in remote and hostile environments to gather sensitive ...
To improve the data aggregation privacy protection scheme in wireless sensor network (WSN), a new sc...
Wireless sensor network can be applied to both abom�inable and military environments. A primary goal...