Secure data aggregation in wireless sensor networks: homomorphism versus watermarking approach
DOI10.1007/978-3-642-17994-5_23zbMATH Open1208.68030OpenAlexW1785154484MaRDI QIDQ3076977FDOQ3076977
Authors: Christophe Guyeux, Abdallah Makhoul, Jacques M. Bahi
Publication date: 25 February 2011
Published in: Ad Hoc Networks (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-17994-5_23
Recommendations
- A power efficient aggregation of encrypted data in wireless sensor network
- Secure data aggregation in wireless sensor networks: a comprehensive overview
- A secure data forwarding protocol for data statistic services in multi-hop marine sensor networks
- An efficient privacy-preserving compressive data gathering scheme in WSNs
- Secure distributed data aggregation
elliptic curvesauthenticationwireless sensor networkshomomorphic encryptionwatermarkingsecure data aggregation
Data encryption (aspects in computer science) (68P25) Network design and communication in computer systems (68M10) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Theory of Cryptography
- Title not available (Why is that?)
- Title not available (Why is that?)
- Hash functions using chaotic iterations
- Cryptanalysis of an algebraic privacy homomorphism
- Selecting cryptographic key sizes
- Title not available (Why is that?)
- Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme
- Secure data aggregation in wireless sensor networks: homomorphism versus watermarking approach
Cited In (6)
- A power efficient aggregation of encrypted data in wireless sensor network
- Discrete logarithm based additively homomorphic encryption and secure data aggregation
- Secure data aggregation in wireless sensor networks: a comprehensive overview
- An efficient privacy-preserving compressive data gathering scheme in WSNs
- A secure data forwarding protocol for data statistic services in multi-hop marine sensor networks
- Secure data aggregation in wireless sensor networks: homomorphism versus watermarking approach
Uses Software
This page was built for publication: Secure data aggregation in wireless sensor networks: homomorphism versus watermarking approach
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3076977)