{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T07:47:01Z","timestamp":1759132021984},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642246494"},{"type":"electronic","value":"9783642246500"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-24650-0_2","type":"book-chapter","created":{"date-parts":[[2011,10,22]],"date-time":"2011-10-22T10:08:55Z","timestamp":1319278135000},"page":"2-13","source":"Crossref","is-referenced-by-count":3,"title":["Secure and Energy-Efficient Data Aggregation with Malicious Aggregator Identification in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Hongjuan","family":"Li","sequence":"first","affiliation":[]},{"given":"Keqiu","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wenyu","family":"Qu","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Stojmenovic","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"2_CR1","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MC.2004.93","volume":"37","author":"D. Culler","year":"2004","unstructured":"Culler, D., Estrin, D., Srivastava, M.: Overview of Sensor Networks. IEEE Computer\u00a037(8), 41\u201349 (2004)","journal-title":"IEEE Computer"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Estrin, D., Govindan, R., Heidemann, J., Kumar, S.: Next century challenges: scalable coordination in sensor networks. In: Proceedings of the ACM International Conference on Mobile Computing and Networking (MobiCom), pp. 263\u2013270 (1999)","DOI":"10.1145\/313451.313556"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Heidemann, J., Silva, F., Intanagonwiwat, C., Govindan, R., Estrin, D., Ganesan, D.: Building efficient wireless sensor networks with low-level naming. In: Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), pp. 146\u2013159 (2001)","DOI":"10.1145\/502034.502049"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Krishnamachari, B., Estrin, D., Wicker, S.: The impact of data aggregation in wireless sensor networks. In: Proceedings of the International Conference on Distributed Computing Systems (ICDCS) Workshops, pp. 575\u2013578 (2002)","DOI":"10.1109\/ICDCSW.2002.1030829"},{"key":"2_CR5","unstructured":"Yu, Y., Krishnamachari, B., Prasanna, V.K.: Energy-latency tradeoffs for data gathering in wireless sensor networks. In: Proceedings of the IEEE Computer and Communications Societies, INFOCOM (2004)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Madden, S., Franklin, M.J., Hellerstein, J.M.: TAG: A Tiny AGgregation Service for Ad-Hoc Sensor Networks. In: Proceedings of the Symposium on Operating Systems Design and Implementation, OSDI (2002)","DOI":"10.1145\/1060289.1060303"},{"key":"2_CR7","unstructured":"Ding, M., Chen, D., Xing, K., Cheng, X.: Localized Faulty-Tolerant Event Boundary Detection in Sensor Networks. In: Proceedings of the IEEE Computer and Communications Societies, INFOCOM (2005)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Parno, B., Perrig, A., Gligor, V.: Distributed Detection of Node Replication Attacks in Sensor Networks. In: Proceedings of the IEEE Symposim on Security and Privacy (SP), pp. 49\u201363 (2005)","DOI":"10.1109\/SP.2005.8"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Chan, H., Perrig, A., Song, D.: Secure hierarchical in-network aggregation in sensor networks. In: Proceedings of the ACM Conference on Computer and Communication Security, CCS (2006)","DOI":"10.1145\/1180405.1180440"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor network. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, Sensys (2003)","DOI":"10.1145\/958491.958521"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Du, W., Deng, J., Han, Y., Varshney, P.K.: A witness-based approach for data fusion assurance in wireless sensor networks. In: Proceedings of the IEEE Global Telecommunications Conference, GLOBECOM (2003)","DOI":"10.1109\/GLOCOM.2003.1258475"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Yang, Y., Wang, X., Zhu, S., Cao, G.: SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks. In: Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc (2006)","DOI":"10.1145\/1132905.1132944"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1007\/0-387-34805-0_21","volume-title":"Advances in Cryptology - CRYPTO \u201989","author":"R.C. Merkle","year":"1990","unstructured":"Merkle, R.C.: A certified digital signature. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.\u00a0435, pp. 218\u2013238. Springer, Heidelberg (1990)"},{"key":"2_CR14","unstructured":"Hu, L., Evans, D.: Secure Aggregation for Wireless Networks. In: Proceedings of the 2003 Symposium on Applications and the Internet Workshops, SAINTW (2003)"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Mykletun, E., Tsudik, G.: Efficient Aggregation of Encrypted Data in Wireless Sensor Networks. In: Proceedings of the International Conference on Mobile and Ubiquitous Systems, Mobiquitous (2005)","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"He, W., Liu, X., Nguyen, H., Nahrstedt, K., Abdelzaher, T.: PDA: Privacy-preserving Data Aggregation in Wireless Sensor Networks. In: Proceedings of the IEEE Computer and Communications Societies, INFOCOM (2007)","DOI":"10.1109\/INFCOM.2007.237"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Itanagonwiwat, C., Govindan, R., Estrin, D.: Directed diffusion: a scalable and robust communication paradigm for sensor networks. In: Proceedings of the ACM International Conference on Mobile Computing and Networking, MobiCom (2000)","DOI":"10.1145\/345910.345920"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Intanagonwiwat, C., Estrin, D., Govindan, R., Heidemann, J.: Impact of Network Density on Data Aggregation in Wireless Sensor Networks. In: Proceedings of the International Conference on Distributed Computing Systems, ICDCS (2002)","DOI":"10.1109\/ICDCS.2002.1022289"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Tang, X., Xu, J.: Extending network lifetime for precision constrained data aggregation in wireless sensor networks. In: Proceedings of the IEEE Computer and Communications Societies, INFOCOM (2006)","DOI":"10.1109\/INFOCOM.2006.149"},{"key":"2_CR20","unstructured":"Ding, M., Chen, D., Xing, K., Cheng, X.: Localized Fault-Tolerant Event Boundary Detection in Sensor Networks. In: Proceedings of the IEEE Computer and Communications Societies (INFOCOM), March 13-17, pp. 902\u2013913 (2005)"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Liu, F., Cheng, X., Chen, D.: Insider Attacker Detection in Wireless Sensor Networks. In: Proceedings of the IEEE Computer and Communications Societies (INFOCOM), May 6-12, pp. 1937\u20131945 (2007)","DOI":"10.1109\/INFCOM.2007.225"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24650-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T08:05:00Z","timestamp":1560845100000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24650-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642246494","9783642246500"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24650-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}