{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:56:56Z","timestamp":1762505816753},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s11235-011-9539-8","type":"journal-article","created":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T17:12:49Z","timestamp":1312218769000},"page":"2163-2176","source":"Crossref","is-referenced-by-count":22,"title":["Preserving privacy against external and internal threats in WSN data aggregation"],"prefix":"10.1007","volume":"52","author":[{"given":"Lei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Honggang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[]},{"given":"Luigi Vincenzo","family":"Mancini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,8,2]]},"reference":[{"key":"9539_CR1","first-page":"2045","volume-title":"INFOCOM\u201907","author":"W. He","year":"2007","unstructured":"He, W., Liu, X., Nguyen, H., Nahrstedt, K., & Abdelzaher, T. (2007). PDA: Privacy-preserving data aggregation in wireless sensor networks. In INFOCOM\u201907 (pp.\u00a02045\u20132053)."},{"key":"9539_CR2","volume-title":"HCMDSS\u201905 workshop","author":"J. A. Stankovic","year":"2005","unstructured":"Stankovic, J. A., Cao, Q., Doan, T., Fang, L., He, Z., Kiran, R., Lin, S., Son, S., Stoleru, R., & Wood, A. (2005). Wireless sensor networks for in-home healthcare: Potential and challenges. In HCMDSS\u201905 workshop."},{"key":"9539_CR3","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1007\/978-3-642-03168-7_10","volume-title":"Privacy enhancing technologies","author":"E. De Cristofaro","year":"2009","unstructured":"De Cristofaro, E., Jarecki, S., Kim, J., & Tsudik, G. (2009). Privacy-preserving policy-based information transfer. In Privacy enhancing technologies (pp.\u00a0164\u2013184)."},{"key":"9539_CR4","first-page":"131","volume-title":"OSDI\u201902","author":"S. Madden","year":"2002","unstructured":"Madden, S., Franklin, M. J., Hellerstein, J. M., & Hong, W. (2002). TAG: a tiny aggregation service for ad-hoc sensor networks. In OSDI\u201902 (pp.\u00a0131\u2013146)."},{"key":"9539_CR5","first-page":"621","volume-title":"SIGMOD\u201902","author":"W. F. Fung","year":"2002","unstructured":"Fung, W. F., Sun, D., & Gehrke, J. (2002). Cougar: the network is the database. In SIGMOD\u201902 (pp.\u00a0621\u2013621)."},{"key":"9539_CR6","doi-asserted-by":"crossref","unstructured":"Castelluccia, C., Chan, A. C.-F., Mykletun, E., & Tsudik, G. (2009). Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN) 5(3).","DOI":"10.1145\/1525856.1525858"},{"key":"9539_CR7","first-page":"3044","volume-title":"ICC\u201905","author":"J. Girao","year":"2005","unstructured":"Girao, J., Westhoff, D., & Schneider, M. (2005). CDA concealed data aggregation for reverse multicast traffic in wireless sensor networks. In ICC\u201905 (pp.\u00a03044\u20133049)."},{"key":"9539_CR8","first-page":"1","volume-title":"INFOCOM\u201908","author":"E. Mlaih","year":"2008","unstructured":"Mlaih, E., & Aly, S. (2008). Secure hop-by-hop aggregation of end-to-end concealed data in wireless sensor networks. In INFOCOM\u201908, April 2008 (pp.\u00a01\u20136)."},{"key":"9539_CR9","first-page":"439","volume-title":"SIGMOD\u201900","author":"R. Agrawal","year":"2000","unstructured":"Agrawal, R., & Srikant, R. (2000). Privacy-preserving data mining. In SIGMOD\u201900 (pp.\u00a0439\u2013450)."},{"key":"9539_CR10","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1145\/775047.775080","volume-title":"KDD\u201902","author":"A. Evfimievski","year":"2002","unstructured":"Evfimievski, A., Srikant, R., Agrawal, R., & Gehrke, J. (2002). Privacy preserving mining of association rules. In KDD\u201902 (pp.\u00a0217\u2013228)."},{"key":"9539_CR11","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/586110.586117","volume-title":"CCS\u201902","author":"L. Eschenauer","year":"2002","unstructured":"Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In CCS\u201902 (pp.\u00a041\u201347)."},{"key":"9539_CR12","doi-asserted-by":"crossref","unstructured":"Pietro, R. D., Mancini, L. V., Mei, A., Panconesi, A., & Radhakrishnan, J. (2008). Redoubtable sensor networks. ACM Transactions on Information and System Security 11(3).","DOI":"10.1145\/1341731.1341734"},{"key":"9539_CR13","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1145\/1132905.1132944","volume-title":"MobiHoc\u201906","author":"Y. Yang","year":"2006","unstructured":"Yang, Y., Wang, X., Zhu, S., & Cao, G. (2006). SDAP: a secure hop-by-hop data aggregation protocol for sensor networks. In MobiHoc\u201906 (pp.\u00a0356\u2013367)."},{"issue":"2","key":"9539_CR14","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1002\/sec.93","volume":"2","author":"R. Di Pietro","year":"2009","unstructured":"Di Pietro, R., Michiardi, P., & Molva, R. (2009). Confidentiality and integrity for data aggregation in WSN using peer monitoring. Security and Communication Networks, 2(2), 181\u2013194.","journal-title":"Security and Communication Networks"},{"key":"9539_CR15","first-page":"71","volume-title":"SASN\u201906","author":"S. Roy","year":"2006","unstructured":"Roy, S., Setia, S., & Jajodia, S. (2006). Attack-resilient hierarchical data aggregation in sensor networks. In SASN\u201906 (pp.\u00a071\u201382)."},{"key":"9539_CR16","doi-asserted-by":"crossref","first-page":"278","DOI":"10.1145\/1180405.1180440","volume-title":"CCS\u201906","author":"H. Chan","year":"2006","unstructured":"Chan, H., Perrig, A., & Song, D. (2006). Secure hierarchical in-network aggregation in sensor networks. In CCS\u201906 (pp.\u00a0278\u2013287)."},{"issue":"8","key":"9539_CR17","doi-asserted-by":"crossref","first-page":"1448","DOI":"10.1016\/j.adhoc.2009.04.007","volume":"7","author":"S. Roy","year":"2009","unstructured":"Roy, S., Conti, M., Setia, S., & Jajodia, S. (2009). Secure median computation in wireless sensor networks. Ad Hoc Networks (Elsevier), 7(8), 1448\u20131462.","journal-title":"Ad Hoc Networks (Elsevier)"},{"key":"9539_CR18","first-page":"1448","volume-title":"ICDE\u201908","author":"A. Deligiannakis","year":"2008","unstructured":"Deligiannakis, A., Stoumpos, V., Kotidis, Y., Vassalos, V., & Delis,\u00a0A. (2008). Outlier-aware data aggregation in sensor networks. In ICDE\u201908 (pp.\u00a01448\u20131450)."},{"key":"9539_CR19","first-page":"78","volume-title":"SASN\u201904","author":"D. Wagner","year":"2004","unstructured":"Wagner, D. (2004). Resilient aggregation in sensor networks. In SASN\u201904 (pp.\u00a078\u201387)."},{"issue":"2","key":"9539_CR20","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1002\/sec.93","volume":"2","author":"R. Di Pietro","year":"2009","unstructured":"Di Pietro, R., Michiardi, P., & Molva, R. (2009). Confidentiality and integrity for data aggregation in wsn using peer monitoring. Security and Communication Networks, 2(2), 181\u2013194.","journal-title":"Security and Communication Networks"},{"key":"9539_CR21","first-page":"160","volume-title":"FOCS\u201982","author":"A. Yao","year":"1982","unstructured":"Yao, A. (1982). Protocols for secure computations. In FOCS\u201982 (pp.\u00a0160\u2013164)."},{"key":"9539_CR22","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1145\/335305.335343","volume-title":"STOC\u201900","author":"R. Cramer","year":"2000","unstructured":"Cramer, R., Damgard, I., & Dziembowski, S. (2000). On the complexity of verifiable secret sharing and multiparty computation. In STOC\u201900 (pp.\u00a0325\u2013334)."},{"key":"9539_CR23","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1145\/1007352.1007447","volume-title":"STOC\u201904","author":"J. Halpern","year":"2004","unstructured":"Halpern, J., & Teague, V. (2004). Rational secret sharing and multiparty computation: extended abstract. In STOC\u201904 (pp.\u00a0623\u2013632)."},{"key":"9539_CR24","first-page":"203","volume-title":"MDAI\u201908","author":"A. Solanas","year":"2008","unstructured":"Solanas, A., & Di Pietro, R. (2008). A\u00a0linear-time multivariate micro-aggregation for privacy protection in uniform very large data sets. In MDAI\u201908 (pp.\u00a0203\u2013214)."},{"issue":"3","key":"9539_CR25","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1016\/j.comcom.2010.05.014","volume":"34","author":"R. Di Pietro","year":"2010","unstructured":"Di Pietro, R., & Viejo, A. (2010). Location privacy and resilience in wireless sensor networks querying. Computer Communications, 34(3), 515\u2013523.","journal-title":"Computer Communications"},{"key":"9539_CR26","first-page":"77","volume-title":"WiSec 2008","author":"Y. Yang","year":"2008","unstructured":"Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., & Cao, G. (2008). Towards event source unobservability with minimum network traffic in sensor networks. In WiSec 2008 (pp.\u00a077\u201388)."},{"key":"9539_CR27","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/ICCCN.2009.5235352","volume-title":"ICCCN\u201909: proceedings of the 2009 proceedings of 18th international conference on computer communications and networks","author":"E. Cristofaro De","year":"2009","unstructured":"De Cristofaro, E., Ding, X., & Tsudik, G. (2009). Privacy-preserving querying in sensor networks. In ICCCN\u201909: proceedings of the 2009 proceedings of 18th international conference on computer communications and networks (pp.\u00a01\u20136). Washington: IEEE Comput. Soc."},{"key":"9539_CR28","unstructured":"Rivest, R., Adleman, L., & Dertouzos, M. (1978). On data banks and privacy homomorphisms. Foundations of Secure Computation 169\u2013179."},{"key":"9539_CR29","first-page":"56","volume-title":"INFOCOM\u201908","author":"T. Feng","year":"2008","unstructured":"Feng, T., Wang, C., Zhang, W., & Ruan, L. (2008). Confidentiality protection for distributed sensor data aggregation. In INFOCOM\u201908, April 2008 (pp.\u00a056\u201360)."},{"key":"9539_CR30","first-page":"52","volume-title":"IECON 07","author":"M. Conti","year":"2007","unstructured":"Conti, M., Di Pietro, R., Mancini, L. V., & Spognardi, A. (2007). FastRIPP: RFID privacy preserving protocol with forward secrecy and fast resynchronization. In IECON 07 (pp.\u00a052\u201357)."},{"key":"9539_CR31","first-page":"910","volume-title":"Proceedings of the third IEEE international symposium on trust, security and privacy for emerging applications (TSP 2010)","author":"L. Zhang","year":"2010","unstructured":"Zhang, L., Zhang, H., Conti, M., Di Pietro, R., Jajodia, S., & Mancini, L. V. (2010). Reverse tree-based key routing: Robust data aggregation in wireless sensor networks. In Proceedings of the third IEEE international symposium on trust, security and privacy for emerging applications (TSP 2010) (pp.\u00a0910\u2013915)."},{"key":"9539_CR32","first-page":"197","volume-title":"S&P\u201903","author":"H. Chan","year":"2003","unstructured":"Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In S&P\u201903 (pp.\u00a0197\u2013213)."},{"key":"9539_CR33","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/MOBIQUITOUS.2005.25","volume-title":"The second annual international conference on mobile and ubiquitous systems: computing, networking and services (MobiQuitous\u201905)","author":"C. Castelluccia","year":"2005","unstructured":"Castelluccia, C., Mykletun, E., & Tsudik, G. (2005). Efficient aggregation of encrypted data in wireless sensor networks. In The second annual international conference on mobile and ubiquitous systems: computing, networking and services (MobiQuitous\u201905) (pp.\u00a0109\u2013117)."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-011-9539-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T13:39:21Z","timestamp":1686231561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-011-9539-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8,2]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["9539"],"URL":"https:\/\/doi.org\/10.1007\/s11235-011-9539-8","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,8,2]]}}}