{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:16:41Z","timestamp":1742912201611,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030627423"},{"type":"electronic","value":"9783030627430"}],"license":[{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-62743-0_125","type":"book-chapter","created":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T06:02:58Z","timestamp":1604383378000},"page":"868-873","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Data Privacy Protection Scheme for Underwater Network"],"prefix":"10.1007","author":[{"given":"Dandan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Shijie","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xiangdang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Qiuling","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"issue":"009","key":"125_CR1","first-page":"2030","volume":"053","author":"S Fu","year":"2016","unstructured":"Fu, S., Jiang, Q., Ma, J.F.: A privacy protection data aggregation scheme for wireless sensor networks. J. Comput. Res. 053(009), 2030\u20132038 (2016)","journal-title":"J. Comput. Res."},{"key":"125_CR2","doi-asserted-by":"crossref","unstructured":"Sran, S.S., Kaur, L., Kaur, G.: Energy aware chain based data aggregation scheme for wireless sensor network. In: Icesa. IEEE (2015)","DOI":"10.1109\/ICESA.2015.7503323"},{"key":"125_CR3","unstructured":"Yessembayev, A., Sarkar, D., Sikder, F.: Detection of good and bad sensor nodes in the presence of malicious attacks and its application to data aggregation. IEEE Trans. Signal Inf. Process. Netw. 4(3), 549\u2013563 (2018)"},{"issue":"7","key":"125_CR4","first-page":"2197","volume":"19","author":"N Wang","year":"2018","unstructured":"Wang, N., Chiang, Y., Hsieh, C., et al.: An efficient grid-based data aggregation scheme for wireless sensor networks. J. Internet Technol. 19(7), 2197\u20132205 (2018)","journal-title":"J. Internet Technol."},{"key":"125_CR5","unstructured":"Shenyang University of Chemical Technology. A security data fusion method based on dynamic segmentation technology: CN201710584414.7, March 11 2017"},{"issue":"4","key":"125_CR6","doi-asserted-by":"publisher","first-page":"80","DOI":"10.3969\/j.issn.1673-4866.2019.04.064","volume":"21","author":"YF Zou","year":"2019","unstructured":"Zou, Y.F., Zhao, J.: Discussion on data aggregation scheme of wireless sensor network that can determine the attacked node in time. China New Commun. 21(4), 80\u201381 (2019). \nhttps:\/\/doi.org\/10.3969\/j.issn.1673-4866.2019.04.064","journal-title":"China New Commun."},{"key":"125_CR7","doi-asserted-by":"crossref","unstructured":"Qin, D., Zhang, Y., Ma, J., et al.: A distributed collision-free data aggregation scheme for wireless sensor network. Int. J. Distrib. Sens. Netw. 14(8) (2018)","DOI":"10.1177\/1550147718795847"},{"key":"125_CR8","doi-asserted-by":"crossref","unstructured":"Shobana, M., Sabitha, R., Karthik, S., et al.: Cluster-based systematic data aggregation model (CSDAM) for real-time data processing in large-scale WSN. Wirel. Pers. Commun., 1\u201319 (2020)","DOI":"10.1007\/s11277-020-07054-2"},{"issue":"6","key":"125_CR9","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.1007\/s11276-015-1076-z","volume":"22","author":"H Lin","year":"2016","unstructured":"Lin, H., Wei, W., Zhao, P., et al.: Energy-efficient compressed data aggregation in underwater acoustic sensor networks. Wirel. Netw. 22(6), 1985\u20131997 (2016)","journal-title":"Wirel. Netw."},{"key":"125_CR10","doi-asserted-by":"crossref","unstructured":"Harb, H., Makhoul, A., Tawbi, S., et al.: Comparison of different data aggregation techniques in distributed sensor networks. IEEE Access 5, 4250\u20134263 (2017)","DOI":"10.1109\/ACCESS.2017.2681207"},{"issue":"3","key":"125_CR11","doi-asserted-by":"publisher","first-page":"5233","DOI":"10.1007\/s10586-017-1195-7","volume":"22","author":"W Fang","year":"2019","unstructured":"Fang, W., Wen, X., Xu, J., et al.: CSDA: a novel cluster-based secure data aggregation scheme for WSNs. Clust. Comput. 22(3), 5233\u20135244 (2019)","journal-title":"Clust. Comput."},{"key":"125_CR12","doi-asserted-by":"publisher","unstructured":"Shen, L.; Yi, X.M.; Chen, X.Y.: Abnormal data driven WSNs data acquisition and routing algorithm. Sens. Microsyst. 39(4), 140\u2013143+147 (2020). \nhttps:\/\/doi.org\/10.13873\/J.1000-9787(2020)04-0140-04","DOI":"10.13873\/J.1000-9787(2020)04-0140-04"},{"key":"125_CR13","doi-asserted-by":"crossref","unstructured":"Huang, X., Sun, S., Yang, Q., et al.: Data uploading strategy for underwater wireless sensor networks. Sensors 19(23), 5265 (2019)","DOI":"10.3390\/s19235265"},{"issue":"2","key":"125_CR14","doi-asserted-by":"publisher","first-page":"337","DOI":"10.13413\/j.cnki.jdxblxb.2019115","volume":"58","author":"LJ Wang","year":"2020","unstructured":"Wang, L.J., Gao, Z.Y., Yao, P.S.: Data compression algorithm based on spatiotemporal correlation in sensor network. J. Jilin Univ. (Sci. Ed.) 58(2), 337\u2013342 (2020). \nhttps:\/\/doi.org\/10.13413\/j.cnki.jdxblxb.2019115","journal-title":"J. Jilin Univ. (Sci. Ed.)"},{"key":"125_CR15","unstructured":"Jin, L.: Analysis of data transmission encryption algorithm based on WSN environment. Digit. World (010), 96\u201397 (2017)"},{"issue":"18","key":"125_CR16","first-page":"127","volume":"26","author":"ML Ye","year":"2018","unstructured":"Ye, M.L.: Privacy protection scheme research based on data aggregation technology of wireless sensor network. Electron. Des. Eng. 26(18), 127\u2013131 (2018)","journal-title":"Electron. Des. Eng."},{"key":"125_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, X., Liu, X., Yu, J., et al.: Energy-efficient privacy preserving data aggregation protocols based on slicing. In: Green Computing and Communications, pp. 546\u2013551 (2019)","DOI":"10.1109\/iThings\/GreenCom\/CPSCom\/SmartData.2019.00109"}],"container-title":["Advances in Intelligent Systems and Computing","The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62743-0_125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T06:49:23Z","timestamp":1604386163000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62743-0_125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,4]]},"ISBN":["9783030627423","9783030627430"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62743-0_125","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,11,4]]},"assertion":[{"value":"4 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPIOT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spiot2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spiot2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}