{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T03:31:28Z","timestamp":1743046288152,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031230974"},{"type":"electronic","value":"9783031230981"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-23098-1_13","type":"book-chapter","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T14:04:12Z","timestamp":1672754652000},"page":"209-224","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Link Aware Aggregation Query with\u00a0Privacy-Preserving Capability in\u00a0Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Yunfeng","family":"Cui","sequence":"first","affiliation":[]},{"given":"Wenbin","family":"Zhai","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Youwei","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Wanying","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,1,4]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.adhoc.2015.01.002","volume":"32","author":"ORM Boudia","year":"2015","unstructured":"Boudia, O.R.M., Senouci, S.M., Feham, M.: A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography. Ad Hoc Netw. 32, 98\u2013113 (2015)","journal-title":"Ad Hoc Netw."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Coman, A., Nascimento, M.A., Sander, J.: A framework for spatio-temporal query processing over wireless sensor networks. In: Proceedings of the 1st International Workshop on Data Management for Sensor Networks: in Conjunction with VLDB 2004, pp. 104\u2013110 (2004)","DOI":"10.1145\/1052199.1052217"},{"issue":"2","key":"13_CR3","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s10619-007-7018-8","volume":"22","author":"A Coman","year":"2007","unstructured":"Coman, A., Sander, J., Nascimento, M.A.: Adaptive processing of historical spatial range queries in peer-to-peer sensor networks. Distrib. Parallel Databases 22(2), 133\u2013163 (2007). https:\/\/doi.org\/10.1007\/s10619-007-7018-8","journal-title":"Distrib. Parallel Databases"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Demirbas, M., Ferhatosmanoglu, H.: Peer-to-peer spatial queries in sensor networks. In: Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003), pp. 32\u201339. IEEE (2003)","DOI":"10.1109\/PTP.2003.1231501"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Deshpande, A., Guestrin, C., Hong, W., Madden, S.: Exploiting correlated attributes in acquisitional query processing. In: 21st International Conference on Data Engineering (ICDE 2005), pp. 143\u2013154. IEEE (2005)","DOI":"10.1109\/ICDE.2005.63"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., Gligor, V.D.: A key-management scheme for distributed sensor networks. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 41\u201347 (2002)","DOI":"10.1145\/586110.586117"},{"issue":"5","key":"13_CR7","first-page":"711","volume":"22","author":"TY Fu","year":"2009","unstructured":"Fu, T.Y., Peng, W.C., Lee, W.C.: Parallelizing itinerary-based KNN query processing in wireless sensor networks. IEEE Trans. Knowl. Data Eng. 22(5), 711\u2013729 (2009)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Goldin, D., Song, M., Kutlu, A., Gao, H., Dave, H.: Georouting and delta-gathering: efficient data propagation techniques for geosensor networks, pp. 73\u201395. GeoSensor Networks, Boca Raton (2005)","DOI":"10.1201\/9780203356869.ch5"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: PDA: privacy-preserving data aggregation in wireless sensor networks. In: IEEE INFOCOM 2007\u201326th IEEE International Conference on Computer Communications, pp. 2045\u20132053. IEEE (2007)","DOI":"10.1109\/INFCOM.2007.237"},{"key":"13_CR10","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1109\/ACCESS.2019.2961512","volume":"8","author":"S Hu","year":"2019","unstructured":"Hu, S., Liu, L., Fang, L., Zhou, F., Ye, R.: A novel energy-efficient and privacy-preserving data aggregation for WSNs. IEEE Access 8, 802\u2013813 (2019)","journal-title":"IEEE Access"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Karp, B., Kung, H.T.: GPSR: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pp. 243\u2013254 (2000)","DOI":"10.1145\/345910.345953"},{"issue":"7","key":"13_CR12","doi-asserted-by":"publisher","first-page":"1471","DOI":"10.1109\/TKDE.2012.94","volume":"25","author":"YH Lin","year":"2012","unstructured":"Lin, Y.H., Chang, S.Y., Sun, H.M.: CDAMA: concealed data aggregation scheme for multiple applications in wireless sensor networks. IEEE Trans. Knowl. Data Eng. 25(7), 1471\u20131483 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"13_CR13","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1109\/TNET.2009.2032910","volume":"18","author":"S Ozdemir","year":"2009","unstructured":"Ozdemir, S., \u00c7am, H.: Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE\/ACM Trans. Netw. 18(3), 736\u2013749 (2009)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"8","key":"13_CR14","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1016\/j.comnet.2011.01.006","volume":"55","author":"S Ozdemir","year":"2011","unstructured":"Ozdemir, S., Xiao, Y.: Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Comput. Netw. 55(8), 1735\u20131746 (2011)","journal-title":"Comput. Netw."},{"key":"13_CR15","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.procs.2016.06.060","volume":"89","author":"E Prathima","year":"2016","unstructured":"Prathima, E., Prakash, T.S., Venugopal, K., Iyengar, S., Patnaik, L.: SDAMQ: secure data aggregation for multiple queries in wireless sensor networks. Procedia Comput. Sci. 89, 283\u2013292 (2016)","journal-title":"Procedia Comput. Sci."},{"issue":"4","key":"13_CR16","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1109\/TIFS.2014.2307197","volume":"9","author":"S Roy","year":"2014","unstructured":"Roy, S., Conti, M., Setia, S., Jajodia, S.: Secure data aggregation in wireless sensor networks: filtering out the attacker\u2019s impact. IEEE Trans. Inf. Forensics Secur. 9(4), 681\u2013694 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Seada, K., Zuniga, M., Helmy, A., Krishnamachari, B.: Energy-efficient forwarding strategies for geographic routing in lossy wireless sensor networks. In: Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, pp. 108\u2013121 (2004)","DOI":"10.1145\/1031495.1031509"},{"issue":"8","key":"13_CR18","doi-asserted-by":"publisher","first-page":"2128","DOI":"10.1109\/TPDS.2014.2346764","volume":"26","author":"KA Shim","year":"2014","unstructured":"Shim, K.A., Park, C.M.: A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26(8), 2128\u20132139 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"13_CR19","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.procs.2016.08.034","volume":"94","author":"VK Singh","year":"2016","unstructured":"Singh, V.K., Verma, S., Kumar, M.: Privacy preserving in-network aggregation in wireless sensor networks. Procedia Comput. Sci. 94, 216\u2013223 (2016)","journal-title":"Procedia Comput. Sci."},{"issue":"4","key":"13_CR20","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.inffus.2011.03.002","volume":"13","author":"A Viejo","year":"2012","unstructured":"Viejo, A., Wu, Q., Domingo-Ferrer, J.: Asymmetric homomorphisms for secure aggregation in heterogeneous scenarios. Inf. Fusion 13(4), 285\u2013295 (2012)","journal-title":"Inf. Fusion"},{"issue":"1","key":"13_CR21","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1007\/s11277-017-4889-5","volume":"98","author":"T Wang","year":"2017","unstructured":"Wang, T., Qin, X., Ding, Y., Liu, L., Luo, Y.: Privacy-preserving and energy-efficient continuous data aggregation algorithm in wireless sensor networks. Wirel. Pers. Commun. 98(1), 665\u2013684 (2017). https:\/\/doi.org\/10.1007\/s11277-017-4889-5","journal-title":"Wirel. Pers. Commun."},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Wu, S.H., Chuang, K.T., Chen, C.M., Chen, M.S.: DIKNN: an itinerary-based KNN query processing algorithm for mobile sensor networks. In: 2007 IEEE 23rd International Conference on Data Engineering, pp. 456\u2013465. IEEE (2007)","DOI":"10.1109\/ICDE.2007.367891"},{"issue":"12","key":"13_CR23","doi-asserted-by":"publisher","first-page":"1655","DOI":"10.1109\/TKDE.2008.80","volume":"20","author":"SH Wu","year":"2008","unstructured":"Wu, S.H., Chuang, K.T., Chen, C.M., Chen, M.S.: Toward the optimal itinerary-based KNN query processing in mobile sensor networks. IEEE Trans. Knowl. Data Eng. 20(12), 1655\u20131668 (2008)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"13_CR24","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.ins.2016.12.050","volume":"390","author":"K Xie","year":"2017","unstructured":"Xie, K., et al.: An efficient privacy-preserving compressive data gathering scheme in WSNs. Inf. Sci. 390, 82\u201394 (2017)","journal-title":"Inf. Sci."},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Xu, Y., Lee, W.C., Xu, J., Mitchell, G.: ProcessingWindow queries in wireless sensor networks. In: 22nd International Conference on Data Engineering (ICDE 2006), p. 70. IEEE (2006)","DOI":"10.1109\/ICDE.2006.119"},{"issue":"2","key":"13_CR26","doi-asserted-by":"publisher","first-page":"300","DOI":"10.3390\/s17020300","volume":"17","author":"K Zhang","year":"2017","unstructured":"Zhang, K., Han, Q., Cai, Z., Yin, G.: RiPPAS: a ring-based privacy-preserving aggregation scheme in wireless sensor networks. Sensors 17(2), 300 (2017)","journal-title":"Sensors"},{"issue":"2","key":"13_CR27","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1049\/iet-ifs.2015.0387","volume":"11","author":"X Zhao","year":"2017","unstructured":"Zhao, X., Zhu, J., Liang, X., Jiang, S., Chen, Q.: Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks. IET Inf. Secur. 11(2), 82\u201388 (2017)","journal-title":"IET Inf. Secur."},{"issue":"5","key":"13_CR28","doi-asserted-by":"publisher","first-page":"3948","DOI":"10.1109\/JIOT.2019.2959094","volume":"7","author":"L Zhou","year":"2019","unstructured":"Zhou, L., Ge, C., Hu, S., Su, C.: Energy-efficient and privacy-preserving data aggregation algorithm for wireless sensor networks. IEEE Internet Things J. 7(5), 3948\u20133957 (2019)","journal-title":"IEEE Internet Things J."},{"key":"13_CR29","unstructured":"Zuniga, M., Krishnamachari, B.: Analyzing the transitional region in low power wireless links. In: 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (IEEE SECON 2004), pp. 517\u2013526. IEEE (2004)"}],"container-title":["Communications in Computer and Information Science","Emerging Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-23098-1_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T14:59:15Z","timestamp":1728658755000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-23098-1_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031230974","9783031230981"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-23098-1_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 January 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Emerging Information Security and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eisa2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/eisa.compute.dtu.dk\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to COVID-19, EISA 2022 was held fully online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}