{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T18:21:22Z","timestamp":1774981282394,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319251400","type":"print"},{"value":"9783319251417","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25141-7_9","type":"book-chapter","created":{"date-parts":[[2015,10,31]],"date-time":"2015-10-31T08:51:25Z","timestamp":1446281485000},"page":"116-131","source":"Crossref","is-referenced-by-count":3,"title":["Hybrid Secure Data Aggregation in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Keyur","family":"Parmar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Devesh C.","family":"Jinwala","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,1]]},"reference":[{"issue":"4","key":"9_CR1","first-page":"393","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E.: Wireless sensor networks: a survey. Comput. Netw. Int. J. Comput. Telecommun. Netw. 38(4), 393\u2013422 (2002)","journal-title":"Comput. Netw. Int. J. Comput. Telecommun. Netw."},{"issue":"3","key":"9_CR2","first-page":"20:1","volume":"5","author":"C Castelluccia","year":"2009","unstructured":"Castelluccia, C., Chan, A.C.F., Mykletun, E., Tsudik, G.: Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sens. Netw. (TOSN) 5(3), 20:1\u201320:36 (2009)","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient aggregation of encrypted data in wireless sensor networks. In: Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, MOBIQUITOUS 2005, pp. 109\u2013117. IEEE, Washington, D.C., July 2005","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"issue":"10","key":"9_CR4","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1109\/MC.2003.1236475","volume":"36","author":"H Chan","year":"2003","unstructured":"Chan, H., Perrig, A.: Security and privacy in sensor networks. Computer 36(10), 103\u2013105 (2003)","journal-title":"Computer"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/3-540-45811-5_37","volume-title":"Information Security","author":"J Domingo-Ferrer","year":"2002","unstructured":"Domingo-Ferrer, J.: A provably secure additive and multiplicative privacy homomorphism. In: Chan, A.H., Gligor, V.D. (eds.) ISC 2002. LNCS, vol. 2433, pp. 471\u2013483. Springer, Heidelberg (2002)"},{"issue":"2","key":"9_CR6","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1109\/MWC.2007.358967","volume":"14","author":"E Fasolo","year":"2007","unstructured":"Fasolo, E., Rossi, M., Widmer, J., Zorzi, M.: In-network aggregation techniques for wireless sensor networks: a survey. Wirel. Commun. 14(2), 70\u201387 (2007)","journal-title":"Wirel. Commun."},{"issue":"7","key":"9_CR7","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1016\/j.adhoc.2006.05.004","volume":"5","author":"J Girao","year":"2007","unstructured":"Girao, J., Westhoff, D., Mykletun, E., Araki, T.: TinyPEDS: tiny persistent encrypted data storage in asynchronous wireless sensor networks. Ad Hoc Netw. 5(7), 1073\u20131089 (2007)","journal-title":"Ad Hoc Netw."},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Girao, J., Westhoff, D., Schneider, M.: CDA: concealed data aggregation for reverse multicast traffic in wireless sensor networks. In: Proceedings of the 40th International Conference on Communications, ICC 2005, pp. 3044\u20133049. IEEE, Seoul, May 2005","DOI":"10.1109\/ICC.2005.1494953"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-540-28632-5_9","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2004","author":"N Gura","year":"2004","unstructured":"Gura, N., Patel, A., Wander, A., Eberle, H., Shantz, S.C.: Comparing elliptic curve cryptography and RSA on 8-bit CPUs. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 119\u2013132. Springer, Heidelberg (2004)"},{"key":"9_CR10","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2003","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography, 1st edn. Springer, Secaucus (2003)","edition":"1"},{"issue":"11","key":"9_CR11","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/356989.356998","volume":"35","author":"J Hill","year":"2000","unstructured":"Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D., Pister, K.: System architecture directions for networked sensors. ACM SIGPLAN Not. 35(11), 93\u2013104 (2000)","journal-title":"ACM SIGPLAN Not."},{"key":"9_CR12","unstructured":"Hu, L., Evans, D.: Secure aggregation for wireless networks. In: Proceedings of the Symposium on Applications and the Internet Workshops, SAINT 2003, pp. 384\u2013391. IEEE, Washington, D.C., January 2003"},{"issue":"177","key":"9_CR13","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-27139-2_7","volume-title":"Ambient Intelligence","author":"P Levis","year":"2005","unstructured":"Levis, P., Madden, S., Polastre, J., Szewczyk, R., Whitehouse, K., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E., Culler, D.: TinyOS: an operating system for sensor networks. In: Weber, W., Rabaey, J.M., Aarts, E. (eds.) Ambient Intelligence, pp. 115\u2013148. Springer, Heidelberg (2005)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Malan, D.J., Welsh, M., Smith, M.D.: A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography. In: Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, SECON 2004, pp. 71\u201380. IEEE, Santa Clara, October 2004","DOI":"10.1109\/SAHCN.2004.1381904"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Mlaih, E., Aly, S.A.: Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks. In: Proceedings of the 2nd IEEE Workshop on Mission Critical Networking in Conjunction with Infocom 2008, MCN 2008, pp. 1\u20136. IEEE, Phoenix, April 2008","DOI":"10.1109\/INFOCOM.2008.4544601"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Mykletun, E., Girao, J., Westhoff, D.: Public key based cryptoschemes for data concealment in wireless sensor networks. In: Proceedings of the IEEE International Conference on Communications, ICC 2006, pp. 2288\u20132295. IEEE, Istanbul, June 2006","DOI":"10.1109\/ICC.2006.255111"},{"issue":"12","key":"9_CR18","first-page":"2022","volume":"53","author":"S Ozdemir","year":"2009","unstructured":"Ozdemir, S., Xiao, Y.: Secure data aggregation in wireless sensor networks: a comprehensive overview. Comput. Netw. Int. J. Comput. Telecommun. Netw. 53(12), 2022\u20132037 (2009)","journal-title":"Comput. Netw. Int. J. Comput. Telecommun. Netw."},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Parmar, K., Jinwala, D.C.: Malleability resilient concealed data aggregation. In: Kermarrec, Y. (ed.) EUNICE 2014. LNCS, vol. 8846, pp. 160\u2013172. Springer, Heidelberg (2014)","DOI":"10.1007\/978-3-319-13488-8_15"},{"issue":"1","key":"9_CR20","doi-asserted-by":"publisher","first-page":"38","DOI":"10.4236\/jis.2015.61005","volume":"6","author":"K Parmar","year":"2015","unstructured":"Parmar, K., Jinwala, D.C.: Symmetric-key based homomorphic primitives for end-to-end secure data aggregation in wireless sensor networks. J. Inf. Secur. 6(1), 38\u201350 (2015)","journal-title":"J. Inf. Secur."},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Peter, S., Piotrowski, K., Langendoerfer, P.: On concealed data aggregation for WSNs. In: Proceedings of the 4th IEEE Consumer Communications Networking Conference, CCNC 2007, pp. 192\u2013196. IEEE, Las Vegas, January 2007","DOI":"10.1109\/CCNC.2007.45"},{"issue":"1","key":"9_CR22","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/TDSC.2008.23","volume":"7","author":"S Peter","year":"2010","unstructured":"Peter, S., Westhoff, D., Castelluccia, C.: A survey on the encryption of convergecast traffic with in-network processing. IEEE Trans. Dependable Secure Comput. 7(1), 20\u201334 (2010)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"11","key":"9_CR23","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169\u2013180 (1978)","journal-title":"Found. Secure Comput."},{"issue":"2","key":"9_CR24","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"2","key":"9_CR25","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2006.315852","volume":"8","author":"Y Wang","year":"2006","unstructured":"Wang, Y., Attebury, G., Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 8(2), 2\u201323 (2006)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"10","key":"9_CR26","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1109\/TMC.2006.144","volume":"5","author":"D Westhoff","year":"2006","unstructured":"Westhoff, D., Girao, J., Acharya, M.: Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation. IEEE Trans. Mob. Comput. 5(10), 1417\u20131431 (2006)","journal-title":"IEEE Trans. Mob. Comput."}],"container-title":["Lecture Notes in Computer Science","Cyber Physical Systems. Design, Modeling, and Evaluation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25141-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T07:45:51Z","timestamp":1748677551000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25141-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319251400","9783319251417"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25141-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]}}}