{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:34Z","timestamp":1750221034799,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,25]],"date-time":"2018-10-25T00:00:00Z","timestamp":1540425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Nature Science Foundation of China","award":["61672111"],"award-info":[{"award-number":["61672111"]}]},{"name":"National Key Research and %Development Program of China","award":["2016QY03D0605 and 2018YFC0831500"],"award-info":[{"award-number":["2016QY03D0605 and 2018YFC0831500"]}]},{"name":"Beijing Natural Science Foundation","award":["4162043"],"award-info":[{"award-number":["4162043"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,25]]},"DOI":"10.1145\/3242102.3242127","type":"proceedings-article","created":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T19:34:05Z","timestamp":1540582445000},"page":"265-273","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Trustworthy Data Aggregation Model Based on Context and Data Density Correlation Degree"],"prefix":"10.1145","author":[{"given":"Yunquan","family":"Gao","sequence":"first","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Xiaoyong","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Jirui","family":"Li","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]},{"given":"Yali","family":"Gao","sequence":"additional","affiliation":[{"name":"Beijing University of Posts and Telecommunications, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2018,10,25]]},"reference":[{"volume-title":"d.}. In Institute for Nuclear Theory","year":"2004","key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. In Institute for Nuclear Theory , Seattle, WA, USA . ( 2004 ). Intel Lab Data {Online}. Available: http:\/\/db.csail.mit.edu\/labdata\/labdata.html. {n. d.}. In Institute for Nuclear Theory, Seattle, WA, USA. (2004). Intel Lab Data {Online}. Available: http:\/\/db.csail.mit.edu\/labdata\/labdata.html."},{"volume-title":"Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a. IEEE","author":"Ahmed I.","key":"e_1_3_2_1_2_1","unstructured":"I. Ahmed , S. A. Munir , and M. Jian . 2007. Energy efficient cluster id based routing in wireless sensor networks-analysis in nakagamim fading channel model. In World of Wireless , Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a. IEEE , Helsinki, Finland, 1--4. I. Ahmed, S. A. Munir, and M. Jian. 2007. Energy efficient cluster id based routing in wireless sensor networks-analysis in nakagamim fading channel model. In World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a. IEEE, Helsinki, Finland, 1--4."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.09.005"},{"volume-title":"Proceedings of the 2008 Spring simulation multiconference. Society for Computer Simulation International\/ACM","author":"Atakli I. M.","key":"e_1_3_2_1_4_1","unstructured":"I. M. Atakli , H. Hu , Y. Chen , W. S. Ku , and Z. Su . 2008. Malicious node detection in wireless sensor networks using weighted trust evaluation . In Proceedings of the 2008 Spring simulation multiconference. Society for Computer Simulation International\/ACM , Ottawa, Canada, 836--843. I. M. Atakli, H. Hu, Y. Chen, W. S. Ku, and Z. Su. 2008. Malicious node detection in wireless sensor networks using weighted trust evaluation. In Proceedings of the 2008 Spring simulation multiconference. Society for Computer Simulation International\/ACM, Ottawa, Canada, 836--843."},{"key":"e_1_3_2_1_5_1","volume-title":"NJ: John Wiley & Sons","author":"Box G.","year":"2008","unstructured":"G. Box , G. Jenkins , G. Reinsel , and G. Ljung . 2008 . Time Series Analysis. NJ: John Wiley & Sons , Inc, Hoboken, New Jersey . G. Box, G. Jenkins, G. Reinsel, and G. Ljung. 2008. Time Series Analysis. NJ: John Wiley & Sons, Inc, Hoboken, New Jersey."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1525856.1525858"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-0983-3"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.06.011"},{"volume-title":"Data Engineering (ICDE), 2014 IEEE 30th International Conference on. IEEE","author":"Gupta M.","key":"e_1_3_2_1_9_1","unstructured":"M. Gupta , J. Gao , X. Yan , H. Cam , and J. Han . 2014. Top-k interesting subgraph discovery in information networks . In Data Engineering (ICDE), 2014 IEEE 30th International Conference on. IEEE , Melbourne, Victoria, Australia, 820--831. M. Gupta, J. Gao, X. Yan, H. Cam, and J. Han. 2014. Top-k interesting subgraph discovery in information networks. In Data Engineering (ICDE), 2014 IEEE 30th International Conference on. IEEE, Melbourne, Victoria, Australia, 820--831."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2402120"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2012.2194788"},{"volume-title":"Distributed Computing Systems Workshops, 2002. Proceedings. 22nd International Conference on. IEEE","author":"Krishnamachari L.","key":"e_1_3_2_1_12_1","unstructured":"L. Krishnamachari , D. Estrin , and S. Wicker . 2002. The impact of data aggregation in wireless sensor networks . In Distributed Computing Systems Workshops, 2002. Proceedings. 22nd International Conference on. IEEE , Vienna, Austria, 575--578. L. Krishnamachari, D. Estrin, and S. Wicker. 2002. The impact of data aggregation in wireless sensor networks. In Distributed Computing Systems Workshops, 2002. Proceedings. 22nd International Conference on. IEEE, Vienna, Austria, 575--578."},{"volume-title":"Mobile Adhoc and Sensor Systems (MASS), 2010 IEEE 7th International Conference on. IEEE","author":"Kumar V.","key":"e_1_3_2_1_13_1","unstructured":"V. Kumar , J. McCarville-Schueths , and S. Madria . 2010. A testbed for secure hierarchical data aggregation in wireless sensor networks . In Mobile Adhoc and Sensor Systems (MASS), 2010 IEEE 7th International Conference on. IEEE , San Francisco, CA, USA, 762--764. V. Kumar, J. McCarville-Schueths, and S. Madria. 2010. A testbed for secure hierarchical data aggregation in wireless sensor networks. In Mobile Adhoc and Sensor Systems (MASS), 2010 IEEE 7th International Conference on. IEEE, San Francisco, CA, USA, 762--764."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-010-0243-9"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858158.1858162"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.43"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2011.16"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2316816"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2487445"},{"volume-title":"Mobile Adhoc and Sensor Systems (MASS), 2010 IEEE 7th International Conference on. IEEE","author":"Salmanian M.","key":"e_1_3_2_1_20_1","unstructured":"M. Salmanian , P. C. Mason , J. Treurniet , L. Pan J. Hu , and M. Li . 2010. A modular security architecture for managing security associations in MANETs . In Mobile Adhoc and Sensor Systems (MASS), 2010 IEEE 7th International Conference on. IEEE , San Francisco, CA, USA, 525--530. M. Salmanian, P. C. Mason, J. Treurniet, L. Pan J. Hu, and M. Li. 2010. A modular security architecture for managing security associations in MANETs. In Mobile Adhoc and Sensor Systems (MASS), 2010 IEEE 7th International Conference on. IEEE, San Francisco, CA, USA, 525--530."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.258"},{"key":"e_1_3_2_1_22_1","volume-title":"A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks","author":"Shim K.-A.","year":"2015","unstructured":"K.-A. Shim and C.-M. Park . 2015. A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks . IEEE transactions on parallel and distributed systems 26, 8 ( 2015 ), 2128--2139. K.-A. Shim and C.-M. Park. 2015. A secure data aggregation scheme based on appropriate cryptographic primitives in heterogeneous wireless sensor networks. IEEE transactions on parallel and distributed systems 26, 8 (2015), 2128--2139."},{"key":"e_1_3_2_1_23_1","volume-title":"Sensors","author":"Stelte B.","year":"2011","unstructured":"B. Stelte and A. Matheus . 2011. Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation . In Sensors , 2011 IEEE. IEEE, Limerick, Ireland, 920--923. B. Stelte and A. Matheus. 2011. Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation. In Sensors, 2011 IEEE. IEEE, Limerick, Ireland, 920--923."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2311693"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7416963"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254850.1254852"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2293093"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.11.004"}],"event":{"name":"MSWIM '18: 21st ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Montreal QC Canada","acronym":"MSWIM '18"},"container-title":["Proceedings of the 21st ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242102.3242127","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3242102.3242127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:36Z","timestamp":1750207416000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3242102.3242127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,25]]},"references-count":28,"alternative-id":["10.1145\/3242102.3242127","10.1145\/3242102"],"URL":"https:\/\/doi.org\/10.1145\/3242102.3242127","relation":{},"subject":[],"published":{"date-parts":[[2018,10,25]]},"assertion":[{"value":"2018-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}