{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T18:48:37Z","timestamp":1768589317559,"version":"3.49.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319914510","type":"print"},{"value":"9783319914527","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91452-7_46","type":"book-chapter","created":{"date-parts":[[2018,5,12]],"date-time":"2018-05-12T06:43:19Z","timestamp":1526107399000},"page":"717-733","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Secure Data Aggregation with Integrity Verification in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Ying","family":"Liu","sequence":"first","affiliation":[]},{"given":"Hui","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yuncheng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Juru","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ke","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Weiling","family":"Lai","sequence":"additional","affiliation":[]},{"given":"Cuiping","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,13]]},"reference":[{"issue":"03","key":"46_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0218126617500438","volume":"26","author":"C Chen","year":"2017","unstructured":"Chen, C., Lin, M., Lin, W.: Designing and implementing a lightweight WSN MAC protocol for smart home networking applications. J. Circ. Syst. Comput. 26(03), 1\u201320 (2017)","journal-title":"J. Circ. Syst. Comput."},{"issue":"03","key":"46_CR2","first-page":"78","volume":"11","author":"ZP Yang","year":"2014","unstructured":"Yang, Z.P., Huang, Q.Z., Wang, M.: Study on application of wireless sensor networks in military highway transportation battlefield environment. Equip. Environ. Eng. 11(03), 78\u201382 (2014)","journal-title":"Equip. Environ. Eng."},{"key":"46_CR3","unstructured":"Ramadan, R., Elfouly, F., Mahmoud, M., Dessouky, M.: Efficient data reporting in a single and multi-object tracking using WSNs. In: IEEE Symposium Series on Computational Intelligence (2015)"},{"key":"46_CR4","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/j.ecolind.2015.05.022","volume":"57","author":"AM Badescu","year":"2015","unstructured":"Badescu, A.M., Cotofana, L.: A wireless sensor network to monitor and protect tigers in the wild. Ecol. Ind. 57, 447\u2013451 (2015)","journal-title":"Ecol. Ind."},{"key":"46_CR5","unstructured":"Lupu, T.-G., Rudas, I., Demiralp, M., Mastorakis, N.: Main types of attacks in wireless sensor networks. In: WSEAS Proceedings International Conference on Recent Advances in Computer Engineering, no. 9 (2009)"},{"key":"46_CR6","doi-asserted-by":"crossref","unstructured":"Ali, A.W., et al.: Energy efficieny in routing protocol and data collection approaches for WSN: a survey. In: 2015 International Conference on Computing, Communication and Automation (ICCCA), pp. 540\u2013545 (2015)","DOI":"10.1109\/CCAA.2015.7148437"},{"key":"46_CR7","doi-asserted-by":"crossref","unstructured":"Sang, Y., Shen, H., Inoguchi, Y., Tan, Y., Xiong, N.: Secure data aggregation in wireless sensor networks: a survey. In: 2006 Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2006, pp. 315\u2013320 (2006)","DOI":"10.1109\/PDCAT.2006.96"},{"issue":"6","key":"46_CR8","doi-asserted-by":"publisher","first-page":"3908","DOI":"10.1109\/TWC.2016.2531041","volume":"15","author":"A Morell","year":"2016","unstructured":"Morell, A., Correa, A., Barcelo, M., Vicario, J.L.: Data aggregation and principal component analysis in WSNs. IEEE Trans. Wirel. Commun. 15(6), 3908\u20133919 (2016)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"6","key":"46_CR9","doi-asserted-by":"publisher","first-page":"1131","DOI":"10.3724\/SP.J.1016.2012.01131","volume":"35","author":"F YongJian","year":"2012","unstructured":"YongJian, F., Hong, C., Ying, Z.X.: Data privacy preservation in wireless sensor networks. Chin. J. Comput. 35(6), 1131\u20131146 (2012)","journal-title":"Chin. J. Comput."},{"key":"46_CR10","doi-asserted-by":"crossref","unstructured":"He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: PDA: privacy-preserving data aggregation in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 2045\u20132053. IEEE (2007)","DOI":"10.1109\/INFCOM.2007.237"},{"key":"46_CR11","doi-asserted-by":"crossref","unstructured":"He, W., Nguyen, H., Liu, X., Nahrstedt, K.: iPDA: an integrity-protecting private data aggregation scheme for wireless sensor networks. In: Military Communications Conference, MILCOM 2008, pp. 1\u20137 (2008)","DOI":"10.1109\/MILCOM.2008.4753645"},{"issue":"2","key":"46_CR12","first-page":"1","volume":"2013","author":"C Li","year":"2013","unstructured":"Li, C., Liu, Y.: ESMART: energy-efficient slice-mix-aggregate for wireless sensor network. Int. J. Distrib. Sens. Netw. 2013(2), 1\u20139 (2013)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"46_CR13","doi-asserted-by":"crossref","unstructured":"Papadopoulos, S., Kiayias, A., Papadias, D.: Secure and efficient in-network processing of exact SUM queries. In: IEEE International Conference on Data Engineering, pp. 517\u2013528 (2011)","DOI":"10.1109\/ICDE.2011.5767886"},{"issue":"15","key":"46_CR14","first-page":"9","volume":"73","author":"HK Desai","year":"2013","unstructured":"Desai, H.K., Jinwala, D.C.: Secure aggregation of exact sum queries with integrity protection for wireless sensor networks. Int. J. Comput. Appl. 73(15), 9\u201317 (2013)","journal-title":"Int. J. Comput. Appl."},{"key":"46_CR15","doi-asserted-by":"crossref","unstructured":"Groat, M.M., He, W., Forrest, S.: KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In: 2011 Proceedings of IEEE INFOCOM, pp. 2024\u20132032 (2011)","DOI":"10.1109\/INFCOM.2011.5935010"},{"issue":"11","key":"46_CR16","first-page":"2268","volume":"42","author":"W Chen","year":"2014","unstructured":"Chen, W., Yu, L., Gao, D.: A privacy preserving histogram aggregation algorithm with integrity verification support. Chin. J. Electron. 42(11), 2268\u20132272 (2014)","journal-title":"Chin. J. Electron."},{"issue":"6","key":"46_CR17","first-page":"50","volume":"5","author":"MN Pavithra","year":"2016","unstructured":"Pavithra, M.N., Chinnaswamy, C.N., Sreenivas, T.H.: Privacy preservation scheme for WSNs using signature and trust value computation. Int. J. Eng. Tech. Res. 5(6), 50\u201353 (2016)","journal-title":"Int. J. Eng. Tech. Res."},{"key":"46_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/978-3-319-26961-0_25","volume-title":"Information Systems Security","author":"S Agrawal","year":"2015","unstructured":"Agrawal, S., Das, M.L., Mathuria, A., Srivastava, S.: Program integrity verification for detecting node capture attack in wireless sensor network. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2015. LNCS, vol. 9478, pp. 419\u2013440. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26961-0_25"},{"key":"46_CR19","doi-asserted-by":"publisher","first-page":"4183","DOI":"10.1109\/ACCESS.2016.2594478","volume":"4","author":"A Al-Riyami","year":"2016","unstructured":"Al-Riyami, A., Zhang, N., Keane, J.: An adaptive early node compromise detection scheme for hierarchical WSNs. IEEE Access 4, 4183\u20134206 (2016)","journal-title":"IEEE Access"},{"key":"46_CR20","doi-asserted-by":"crossref","unstructured":"Nath, S., Yu, H., Chan, H.: Secure outsourced aggregation via one-way chains. In: ACM SIGMOD International Conference on Management of Data, SIGMOD 2009, Providence, Rhode Island, USA, 29 June\u2013July 2009, pp. 31\u201344 (2009)","DOI":"10.1145\/1559845.1559851"},{"issue":"SI","key":"46_CR21","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1145\/844128.844142","volume":"36","author":"Samuel Madden","year":"2002","unstructured":"Madden, S., Franklin, M.J., Hellerstein, J.M., Hong, W.: TAG: a tiny aggregation service for ad-hoc sensor networks. In: Symposium on Operating Systems Design and Implementation Copyright Restrictions Prevent ACM From Being Able To Make the Pdfs for This Conference Available for Downloading, pp. 131\u2013146 (2002)","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"46_CR22","unstructured":"Cryptographic hash function. https:\/\/en.wikipedia.org\/wiki\/Cryptographic_hash_function"},{"key":"46_CR23","unstructured":"Omnet++4.1. https:\/\/omnetpp.org\/"},{"key":"46_CR24","unstructured":"\u201cGrand-st-bernarddeployment,\u201d http:\/\/lcav.epfl.ch\/cms\/lang\/en\/pid\/86035"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91452-7_46","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:19:09Z","timestamp":1709831949000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91452-7_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319914510","9783319914527"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91452-7_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"13 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ict.griffith.edu.au\/conferences\/dasfaa2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}