2012
DOI: 10.1109/tpds.2011.219
|View full text |Cite
|
Sign up to set email alerts
|

RCDA: Recoverable Concealed Data Aggregation for Data Integrity in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 110 publications
(21 citation statements)
references
References 20 publications
0
21
0
Order By: Relevance
“…The base station can recover all sensing data, even it can be aggregated, and this property was called as recoverable [19]. Ozdemir et al formulated a hierarchical secret data aggregation for WSN.…”
Section: Related Workmentioning
confidence: 99%
“…The base station can recover all sensing data, even it can be aggregated, and this property was called as recoverable [19]. Ozdemir et al formulated a hierarchical secret data aggregation for WSN.…”
Section: Related Workmentioning
confidence: 99%
“…In protocol proposed by authors of [8] Basestation (BS) can regain all sensing data even though these data has been aggregated. The authors named this property as "recoverable.…”
Section: Protocols For Data Authentication and Integritymentioning
confidence: 99%
“…CMT [17], paillier, Elgamal, RSA. We are using additive homomorphic encryption schemes mentioned in [8] and [17].…”
Section: Proposed Protocol 41 Preliminariesmentioning
confidence: 99%
“…Data aggregation [5,6,7,8,9,10,11,12,13,14] is one of the most important solutions in minimizing the transmitted data size in large-scale wireless networks and is also one of the most important tasks in other distributed applications [15,16,17,18,19,20,21]. Data aggregation can be achieved via In-server or In-network aggregation.…”
Section: Introductionmentioning
confidence: 99%
“…To solve this problem, several secure data aggregation schemes have been proposed, such as synopsis diffusion-based [7,8,9], shuffling-based [6], and homomorphic encryption-based [10,11,12,13,14] data aggregation. Homomorphic encryption-based data aggregation, which has a better theoretical foundation, will be used in the proposed schemes.…”
Section: Introductionmentioning
confidence: 99%