{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T10:30:12Z","timestamp":1742639412697,"version":"3.37.3"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,8,17]],"date-time":"2017-08-17T00:00:00Z","timestamp":1502928000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402014"],"award-info":[{"award-number":["61402014"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2018,1]]},"DOI":"10.1007\/s11277-017-4889-5","type":"journal-article","created":{"date-parts":[[2017,8,17]],"date-time":"2017-08-17T14:20:07Z","timestamp":1502979607000},"page":"665-684","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Privacy-Preserving and Energy-Efficient Continuous Data Aggregation Algorithm in Wireless Sensor Networks"],"prefix":"10.1007","volume":"98","author":[{"given":"Taochun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiaolin","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Youwei","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yonglong","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,17]]},"reference":[{"issue":"6","key":"4889_CR1","doi-asserted-by":"crossref","first-page":"3787","DOI":"10.1109\/TWC.2017.2688442","volume":"16","author":"HC Lin","year":"2017","unstructured":"Lin, H. C., & Chen, W. Y. (2017). An approximation algorithm for the maximum-lifetime data aggregation tree problem in wireless sensor networks. IEEE Transactions on Wireless Communications, 16(6), 3787\u20133798.","journal-title":"IEEE Transactions on Wireless Communications"},{"key":"4889_CR2","doi-asserted-by":"crossref","first-page":"368","DOI":"10.1016\/j.adhoc.2015.08.014","volume":"36","author":"S Abbasi-Daresari","year":"2016","unstructured":"Abbasi-Daresari, S., & Abouei, J. (2016). Toward cluster-based weighted compressive data aggregation in wireless sensor networks. Ad Hoc Networks, 36, 368\u2013385.","journal-title":"Ad Hoc Networks"},{"issue":"3","key":"4889_CR3","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/2744198","volume":"11","author":"M Bagaa","year":"2015","unstructured":"Bagaa, M., Younis, M., Djenouri, D., et al. (2015). Distributed low-latency data aggregation scheduling in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 11(3), 49.","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"issue":"1","key":"4889_CR4","first-page":"6","volume":"8","author":"W He","year":"2011","unstructured":"He, W., Liu, X., Nguyen, H. V., et al. (2011). PDA: Privacy-preserving data aggregation for information collection. ACM Transactions on Sensor Networks (TOSN), 8(1), 6.","journal-title":"ACM Transactions on Sensor Networks (TOSN)"},{"issue":"4","key":"4889_CR5","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1002\/wcm.2369","volume":"15","author":"S Ozdemir","year":"2015","unstructured":"Ozdemir, S., Peng, M., & Xiao, Y. (2015). PRDA: Polynomial regression-based privacy-preserving data aggregation for wireless sensor networks. Wireless communications and mobile computing, 15(4), 615\u2013628.","journal-title":"Wireless communications and mobile computing"},{"issue":"8","key":"4889_CR6","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1016\/j.comnet.2011.01.006","volume":"55","author":"S Ozdemir","year":"2011","unstructured":"Ozdemir, S., & Xiao, Y. (2011). Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Computer Networks, 55(8), 1735\u20131746.","journal-title":"Computer Networks"},{"key":"4889_CR7","doi-asserted-by":"crossref","unstructured":"Groat, M. M., He, W., & Forrest, S. (2011). KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. In Proceedings of the 30th IEEE international conference on computer communications. Shanghai, China, pp. 2024\u20132032.","DOI":"10.1109\/INFCOM.2011.5935010"},{"issue":"13","key":"4889_CR8","doi-asserted-by":"crossref","first-page":"2024","DOI":"10.1002\/sec.1459","volume":"9","author":"M Elhoseny","year":"2016","unstructured":"Elhoseny, M., Yuan, X., El-Minir, H. K., et al. (2016). An energy efficient encryption method for secure dynamic WSN. Security and Communication Networks, 9(13), 2024\u20132031.","journal-title":"Security and Communication Networks"},{"key":"4889_CR9","doi-asserted-by":"crossref","unstructured":"Silberstein, A., Braynard, R., & Yang, J. (2006). Constraint chaining: on energy-efficient continuous monitoring in sensor networks. In Proceedings of the 2006 ACM SIGMOD international conference on management of data. ACM, pp. 157\u2013168.","DOI":"10.1145\/1142473.1142492"},{"issue":"3","key":"4889_CR10","doi-asserted-by":"crossref","first-page":"762","DOI":"10.1109\/TPDS.2013.63","volume":"25","author":"L Yu","year":"2014","unstructured":"Yu, L., Li, J., Cheng, S., et al. (2014). Secure continuous aggregation in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 25(3), 762\u2013774.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"6","key":"4889_CR11","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1016\/j.jpdc.2013.02.005","volume":"73","author":"S Ji","year":"2013","unstructured":"Ji, S., He, J. S., Pan, Y., et al. (2013). Continuous data aggregation and capacity in probabilistic wireless sensor networks. Journal of Parallel and Distributed Computing, 73(6), 729\u2013745.","journal-title":"Journal of Parallel and Distributed Computing"},{"issue":"3","key":"4889_CR12","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1016\/j.jksuci.2015.11.001","volume":"28","author":"M Elhoseny","year":"2016","unstructured":"Elhoseny, M., Elminir, H., Riad, A., et al. (2016). A secure data routing schema for WSN using Elliptic Curve Cryptography and homomorphic encryption. Journal of King Saud University-Computer and Information Sciences, 28(3), 262\u2013275.","journal-title":"Journal of King Saud University-Computer and Information Sciences"},{"key":"4889_CR13","doi-asserted-by":"crossref","unstructured":"Eschenauer, L., & Gligor, V. D. (2002). A key-management scheme for distributed sensor networks. In Proceedings of the 9th ACM conference on computer and communications security. ACM, pp. 41\u201347.","DOI":"10.1145\/586110.586117"},{"issue":"5","key":"4889_CR14","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/TKDE.2009.146","volume":"22","author":"Fu Taoyang","year":"2010","unstructured":"Taoyang, Fu, Wenchih, Peng, & Wangchien, Lee. (2010). Parallelizing itinerary-based KNN query processing in wireless sensor networks. IEEE Transactions on Knowledge and Data Engineering, 22(5), 711\u2013729.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"4889_CR15","unstructured":"Samuel, M. (2004). Intel lab data. http:\/\/db.csail.mit.edu\/labdata\/labdata.html , p. 6."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-017-4889-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4889-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-017-4889-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,26]],"date-time":"2024-06-26T09:58:59Z","timestamp":1719395939000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-017-4889-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,17]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["4889"],"URL":"https:\/\/doi.org\/10.1007\/s11277-017-4889-5","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2017,8,17]]}}}