{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:31:23Z","timestamp":1761744683937,"version":"3.37.3"},"reference-count":78,"publisher":"Oxford University Press (OUP)","issue":"4","license":[{"start":{"date-parts":[[2018,2,13]],"date-time":"2018-02-13T00:00:00Z","timestamp":1518480000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4,1]]},"DOI":"10.1093\/comjnl\/bxy013","type":"journal-article","created":{"date-parts":[[2018,1,19]],"date-time":"2018-01-19T15:14:42Z","timestamp":1516374882000},"page":"614-628","source":"Crossref","is-referenced-by-count":18,"title":["Privacy Preserving, Verifiable and Resilient Data Aggregation in Grid-Based Networks"],"prefix":"10.1093","volume":"61","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8494-9752","authenticated-orcid":false,"given":"Kaushal A","family":"Shah","sequence":"first","affiliation":[{"name":"Computer Engineering Department, S.V. National Institute of Technology, Surat, India"}]},{"given":"Devesh C","family":"Jinwala","sequence":"additional","affiliation":[{"name":"Computer Engineering Department, S.V. National Institute of Technology, Surat, India"}]}],"member":"286","published-online":{"date-parts":[[2018,2,13]]},"reference":[{"key":"key\n\t\t\t\t20180329074321_bxy013C1","doi-asserted-by":"crossref","first-page":"2292","DOI":"10.1016\/j.comnet.2008.04.002","article-title":"Wireless sensor network survey","volume":"52","author":"Yick","year":"2008","journal-title":"Comput. Netw."},{"key":"key\n\t\t\t\t20180329074321_bxy013C2","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","article-title":"Wireless sensor networks: a survey","volume":"38","author":"Akyildiz","year":"2002","journal-title":"Comput. Netw."},{"year":"2004","author":"Edu","key":"key\n\t\t\t\t20180329074321_bxy013C3"},{"year":"2013","author":"Zolertia","key":"key\n\t\t\t\t20180329074321_bxy013C4"},{"year":"2007","author":"Digikey","key":"key\n\t\t\t\t20180329074321_bxy013C5"},{"year":"2002","author":"Krishnamachari","key":"key\n\t\t\t\t20180329074321_bxy013C6"},{"key":"key\n\t\t\t\t20180329074321_bxy013C7","doi-asserted-by":"crossref","first-page":"2022","DOI":"10.1016\/j.comnet.2009.02.023","article-title":"Secure data aggregation in wireless sensor networks: a comprehensive overview","volume":"53","author":"Ozdemir","year":"2009","journal-title":"Comput. Netw."},{"key":"key\n\t\t\t\t20180329074321_bxy013C8","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/990680.990707","article-title":"Security in wireless sensor networks","volume":"47","author":"Perrig","year":"2004","journal-title":"Commun. ACM"},{"key":"key\n\t\t\t\t20180329074321_bxy013C9","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1145\/1065545.1065548","article-title":"A pairwise key predistribution scheme for wireless sensor networks","volume":"8","author":"Du","year":"2005","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"key\n\t\t\t\t20180329074321_bxy013C10","doi-asserted-by":"crossref","first-page":"1740","DOI":"10.1109\/TIT.2012.2219578","article-title":"Modeling the pairwise key predistribution scheme in the presence of unreliable links","volume":"59","author":"Yagan","year":"2013","journal-title":"IEEE Trans. Inf. Theory"},{"year":"2014","author":"Yavuz","key":"key\n\t\t\t\t20180329074321_bxy013C11"},{"year":"2011","author":"Kalogridis","key":"key\n\t\t\t\t20180329074321_bxy013C12"},{"year":"2008","author":"De Meulenaer","key":"key\n\t\t\t\t20180329074321_bxy013C13"},{"year":"2016","author":"Shah","key":"key\n\t\t\t\t20180329074321_bxy013C14"},{"year":"2007","author":"He","key":"key\n\t\t\t\t20180329074321_bxy013C15"},{"key":"key\n\t\t\t\t20180329074321_bxy013C16","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MC.2003.1236475","article-title":"Security and privacy in sensor networks","volume":"36","author":"Chan","year":"2003","journal-title":"Computer"},{"year":"2002","author":"Domingo-Ferrer","key":"key\n\t\t\t\t20180329074321_bxy013C17"},{"key":"key\n\t\t\t\t20180329074321_bxy013C18","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/S0020-0190(96)00170-6","article-title":"A new privacy homomorphism and applications","volume":"60","author":"i Ferrer","year":"1996","journal-title":"Inf. Process. Lett."},{"key":"key\n\t\t\t\t20180329074321_bxy013C19","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2007\/13801","article-title":"A survey of homomorphic encryption for nonspecialists","volume":"2007","author":"Fontaine","year":"2007","journal-title":"EURASIP J. Inf. Secur."},{"year":"2008","author":"Chan","key":"key\n\t\t\t\t20180329074321_bxy013C20"},{"year":"2009","author":"Agrawal","key":"key\n\t\t\t\t20180329074321_bxy013C21"},{"year":"2013","author":"Westhoff","key":"key\n\t\t\t\t20180329074321_bxy013C22"},{"year":"2009","author":"Martin","key":"key\n\t\t\t\t20180329074321_bxy013C23"},{"key":"key\n\t\t\t\t20180329074321_bxy013C24","doi-asserted-by":"crossref","first-page":"3905","DOI":"10.1007\/s11277-017-4031-8","article-title":"Novel approach for pre-distributing keys in wsns for linear infrastructure","volume":"95","author":"Shah","year":"2017","journal-title":"Wireless Pers. Commun."},{"key":"key\n\t\t\t\t20180329074321_bxy013C25","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","article-title":"Eppa: an efficient and privacy-preserving aggregation scheme for secure smart grid communications","volume":"23","author":"Lu","year":"2012","journal-title":"IEEE Trans. Parall. Distr. Syst."},{"key":"key\n\t\t\t\t20180329074321_bxy013C26","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/TSG.2012.2224389","article-title":"A decentralized security framework for data aggregation and access control in smart grids","volume":"4","author":"Ruj","year":"2013","journal-title":"IEEE Trans. Smart Grid"},{"key":"key\n\t\t\t\t20180329074321_bxy013C27","doi-asserted-by":"crossref","first-page":"971","DOI":"10.1007\/s11277-015-2633-6","article-title":"Malleability resilient concealed data aggregation in wireless sensor networks","volume":"87","author":"Parmar","year":"2016","journal-title":"Wireless Personal Commun."},{"year":"2011","author":"Cheung","key":"key\n\t\t\t\t20180329074321_bxy013C28"},{"key":"key\n\t\t\t\t20180329074321_bxy013C29","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1109\/TII.2013.2277938","article-title":"Privacy-enhanced data aggregation scheme against internal attackers in smart grid","volume":"10","author":"Fan","year":"2014","journal-title":"IEEE Trans. Ind. Informat."},{"year":"2010","author":"Kalogridis","key":"key\n\t\t\t\t20180329074321_bxy013C30"},{"year":"2010","author":"Efthymiou","key":"key\n\t\t\t\t20180329074321_bxy013C31"},{"year":"2010","author":"Fhom","key":"key\n\t\t\t\t20180329074321_bxy013C32"},{"year":"2010","author":"Budka","key":"key\n\t\t\t\t20180329074321_bxy013C33"},{"year":"2011","author":"Kursawe","key":"key\n\t\t\t\t20180329074321_bxy013C34"},{"year":"2011","author":"Chim","key":"key\n\t\t\t\t20180329074321_bxy013C35"},{"year":"2011","author":"Kalogridis","key":"key\n\t\t\t\t20180329074321_bxy013C36"},{"year":"2011","author":"Rajagopalan","key":"key\n\t\t\t\t20180329074321_bxy013C37"},{"year":"2008","author":"Blackburn","key":"key\n\t\t\t\t20180329074321_bxy013C38"},{"year":"2006","author":"Mohaisen","key":"key\n\t\t\t\t20180329074321_bxy013C39"},{"year":"2007","author":"Mohaisen","key":"key\n\t\t\t\t20180329074321_bxy013C40"},{"key":"key\n\t\t\t\t20180329074321_bxy013C41","first-page":"288","article-title":"Resilient aggregation in simple linear sensor networks","volume":"2014","author":"Henry","year":"2014","journal-title":"IACR Cryptol. ePrint Arch."},{"year":"2005","author":"Castelluccia","key":"key\n\t\t\t\t20180329074321_bxy013C42"},{"key":"key\n\t\t\t\t20180329074321_bxy013C43","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/1525856.1525858","article-title":"Efficient and provably secure aggregation of encrypted data in wireless sensor networks","volume":"5","author":"Castelluccia","year":"2009","journal-title":"ACM Trans. Sen. Netw."},{"year":"2004","author":"Malan","key":"key\n\t\t\t\t20180329074321_bxy013C44"},{"key":"key\n\t\t\t\t20180329074321_bxy013C45","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest","year":"1978","journal-title":"Foundat. Secur. Computat."},{"year":"2005","author":"Girao","key":"key\n\t\t\t\t20180329074321_bxy013C46"},{"key":"key\n\t\t\t\t20180329074321_bxy013C47","doi-asserted-by":"crossref","first-page":"1417","DOI":"10.1109\/TMC.2006.144","article-title":"Concealed data aggregation for reverse multicast traffic in sensor networks: encryption, key distribution, and routing adaptation","volume":"5","author":"Westhoff","year":"2006","journal-title":"IEEE Trans. Mob. Comput."},{"year":"2007","author":"Peter","key":"key\n\t\t\t\t20180329074321_bxy013C48"},{"year":"2006","author":"Mykletun","key":"key\n\t\t\t\t20180329074321_bxy013C49"},{"year":"2014","author":"Parmar","key":"key\n\t\t\t\t20180329074321_bxy013C50"},{"key":"key\n\t\t\t\t20180329074321_bxy013C51","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1002\/sec.93","article-title":"Confidentiality and integrity for data aggregation in wsn using peer monitoring","volume":"2","author":"Di Pietro","year":"2009","journal-title":"Secur. Commun. Netw."},{"key":"key\n\t\t\t\t20180329074321_bxy013C52","doi-asserted-by":"crossref","first-page":"1157","DOI":"10.1016\/j.jpdc.2012.06.006","article-title":"Efficient data aggregation with in-network integrity control for wsn","volume":"72","author":"Bagaa","year":"2012","journal-title":"J. Parallel Distrib. Comput."},{"key":"key\n\t\t\t\t20180329074321_bxy013C53","first-page":"57","article-title":"Sashimi: secure aggregation via successively hierarchical inspecting of message integrity on wsn","volume":"4","author":"Chen","year":"2013","journal-title":"J. Inf. Hiding Multimedia Signal Process."},{"key":"key\n\t\t\t\t20180329074321_bxy013C54","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1023\/A:1016598314198","article-title":"Spins: security protocols for sensor networks","volume":"8","author":"Perrig","year":"2002","journal-title":"Wireless Netw."},{"year":"2004","author":"Karlof","key":"key\n\t\t\t\t20180329074321_bxy013C55"},{"year":"2013","author":"Salehi","key":"key\n\t\t\t\t20180329074321_bxy013C56"},{"year":"2006","author":"Pathan","key":"key\n\t\t\t\t20180329074321_bxy013C57"},{"year":"2006","author":"Sang","key":"key\n\t\t\t\t20180329074321_bxy013C58"},{"key":"key\n\t\t\t\t20180329074321_bxy013C59","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1109\/TPDS.2011.219","article-title":"Rcda: recoverable concealed data aggregation for data integrity in wireless sensor networks","volume":"23","author":"Chen","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"year":"2007","author":"Ozdemir","key":"key\n\t\t\t\t20180329074321_bxy013C60"},{"key":"key\n\t\t\t\t20180329074321_bxy013C61","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1002\/dac.2412","article-title":"High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks","volume":"26","author":"Liu","year":"2013","journal-title":"Int. J. Commun. Syst."},{"key":"key\n\t\t\t\t20180329074321_bxy013C62","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MPAE.2003.1192027","article-title":"Power signature analysis","volume":"1","author":"Laughman","year":"2003","journal-title":"IEEE Power Energ. Mag."},{"key":"key\n\t\t\t\t20180329074321_bxy013C63","doi-asserted-by":"crossref","first-page":"2011","DOI":"10.1109\/TCE.2010.5606359","article-title":"Aero: extraction of user\u2019s activities from electric power consumption data","volume":"56","author":"Cho","year":"2010","journal-title":"IEEE Trans. Consum. Electron."},{"year":"2008","author":"Lisovich","key":"key\n\t\t\t\t20180329074321_bxy013C64"},{"key":"key\n\t\t\t\t20180329074321_bxy013C65","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1109\/MSP.2009.76","article-title":"Security and privacy challenges in the smart grid","volume":"7","author":"McDaniel","year":"2009","journal-title":"IEEE Security Privacy"},{"key":"key\n\t\t\t\t20180329074321_bxy013C66","doi-asserted-by":"crossref","first-page":"1870","DOI":"10.1109\/5.192069","article-title":"Non-intrusive appliance load monitoring","volume":"80","author":"Hart","year":"1992","journal-title":"Proc. IEEE"},{"key":"key\n\t\t\t\t20180329074321_bxy013C67","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1109\/TCE.2007.381742","article-title":"A novel method to construct taxonomy electrical appliances based on load signaturesof","volume":"53","author":"Lam","year":"2007","journal-title":"IEEE Trans. Consum. Electron."},{"key":"key\n\t\t\t\t20180329074321_bxy013C68","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1109\/COMST.2014.2341600","article-title":"Energy-efficient information and communication infrastructures in the smart grid: a survey on interactions and open issues","volume":"17","author":"Erol-Kantarci","year":"2015","journal-title":"IEEE Commun. Surveys Tuts."},{"key":"key\n\t\t\t\t20180329074321_bxy013C69","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1016\/j.rser.2014.08.036","article-title":"A review of wireless communications for smart grid","volume":"41","author":"Mahmood","year":"2015","journal-title":"Renewable Sustainable Energy Rev."},{"key":"key\n\t\t\t\t20180329074321_bxy013C70","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM"},{"year":"2007","author":"Jaggi","key":"key\n\t\t\t\t20180329074321_bxy013C71"},{"year":"2003","author":"Hu","key":"key\n\t\t\t\t20180329074321_bxy013C72"},{"key":"key\n\t\t\t\t20180329074321_bxy013C73","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1145\/1380564.1380568","article-title":"Sdap: a secure hop-by-hop data aggregation protocol for sensor networks","volume":"11","author":"Yang","year":"2008","journal-title":"ACM Trans. Inf. Syst. Security"},{"year":"2005","author":"Ding","key":"key\n\t\t\t\t20180329074321_bxy013C74"},{"key":"key\n\t\t\t\t20180329074321_bxy013C75","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MPRV.2008.6","article-title":"Denial-of-service in wireless sensor networks: attacks and defenses","volume":"7","author":"Raymond","year":"2008","journal-title":"IEEE Pervasive Comput."},{"year":"1994","author":"Rivest","key":"key\n\t\t\t\t20180329074321_bxy013C76"},{"year":"2010","author":"Yun","key":"key\n\t\t\t\t20180329074321_bxy013C77"},{"year":"2010","author":"Karnouskos","key":"key\n\t\t\t\t20180329074321_bxy013C78"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/4\/614\/24509723\/bxy013.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,29]],"date-time":"2018-03-29T07:43:31Z","timestamp":1522309411000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/4\/614\/4855686"}},"subtitle":[],"editor":[{"given":"Albert","family":"Levi","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,2,13]]},"references-count":78,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2018,2,13]]},"published-print":{"date-parts":[[2018,4,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy013","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2018,4]]},"published":{"date-parts":[[2018,2,13]]}}}