{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T12:42:40Z","timestamp":1740141760365,"version":"3.37.3"},"reference-count":42,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"European Community\u2019s 7th Framework Programme"},{"DOI":"10.13039\/501100003825","name":"Hungarian Academy of Sciences","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100003825","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2011,1,1]]},"abstract":"<jats:p> In mission critical cyber-physical systems, dependability is an important requirement at all layers of the system architecture. In this paper, we propose protocols that increase the dependability of wireless sensor networks, which are potentially useful building blocks in cyber-physical systems. More specifically, we propose two private aggregator node election protocols, a private data aggregation protocol, and a corresponding private query protocol for sensor networks that allow for secure in-network data aggregation by making it difficult for an adversary to identify and then physically disable the designated aggregator nodes. Our advanced protocols resist strong adversaries that can physically compromise some nodes. <\/jats:p>","DOI":"10.1155\/2011\/828414","type":"journal-article","created":{"date-parts":[[2011,10,3]],"date-time":"2011-10-03T19:01:08Z","timestamp":1317668468000},"page":"828414","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":3,"title":["Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks"],"prefix":"10.1177","volume":"7","author":[{"given":"Tam\u00e1s","family":"Holczer","sequence":"first","affiliation":[{"name":"Laboratory of Cryptography and Systems Security (CRYSYS), Budapest University of Technology and Economics, Bme-Hit, P.O. Box 91, 1521 Budapest, Hungary"}]},{"given":"Levente","family":"Butty\u00e1n","sequence":"additional","affiliation":[{"name":"Laboratory of Cryptography and Systems Security (CRYSYS), Budapest University of Technology and Economics, Bme-Hit, P.O. Box 91, 1521 Budapest, Hungary"}]}],"member":"179","published-online":{"date-parts":[[2011,10,3]]},"reference":[{"key":"B1-2011-828414","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2009.5337013"},{"key":"B2-2011-828414","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2010.5663911"},{"key":"B3-2011-828414","doi-asserted-by":"publisher","DOI":"10.1134\/S0361768807040044"},{"key":"B4-2011-828414","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/679205"},{"key":"B5-2011-828414","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926982"},{"key":"B6-2011-828414","first-page":"1","volume-title":"Proceedings of the 2nd USENIX Workshop on Electronic Commerce","volume":"2","author":"Anderson R."},{"key":"B7-2011-828414","series-title":"Cryptology and Information Security Series","volume-title":"Wireless Sensor Network Security","author":"Lopez J.","year":"2008"},{"first-page":"197","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Chan H.","key":"B8-2011-828414"},{"first-page":"62","volume-title":"Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)","author":"Zhu S.","key":"B9-2011-828414"},{"first-page":"151","volume-title":"Proceedings of the 2nd ACM International Workshop on Wireless Sensor Networks and Applications (WSNA '03)","author":"Ganesan P.","key":"B10-2011-828414"},{"key":"B11-2011-828414","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180366"},{"key":"B12-2011-828414","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2006.104"},{"key":"B13-2011-828414","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2006.1687761"},{"key":"B14-2011-828414","doi-asserted-by":"publisher","DOI":"10.1145\/1341771.1341791"},{"key":"B15-2011-828414","doi-asserted-by":"publisher","DOI":"10.1109\/18.746787"},{"key":"B16-2011-828414","doi-asserted-by":"publisher","DOI":"10.1109\/IPSN.2008.47"},{"key":"B17-2011-828414","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77690-1_19"},{"key":"B18-2011-828414","doi-asserted-by":"publisher","DOI":"10.1109\/INSS.2008.4610921"},{"key":"B19-2011-828414","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2010.5506580"},{"key":"B22-2011-828414","volume":"5","author":"Perrig A.","year":"2002","journal-title":"RSA CryptoBytes"},{"key":"B23-2011-828414","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.49"},{"key":"B24-2011-828414","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2009.5336988"},{"key":"B25-2011-828414","first-page":"329","volume-title":"Handbook of Combinatorial Optimization","author":"Blum J.","year":"2004"},{"key":"B27-2011-828414","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9939-1956-0078686-7"},{"key":"B28-2011-828414","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1957.tb01515.x"},{"key":"B29-2011-828414","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.235573"},{"key":"B30-2011-828414","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139168724"},{"key":"B31-2011-828414","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04904-0_28"},{"key":"B32-2011-828414","doi-asserted-by":"publisher","DOI":"10.1007\/11734727_5"},{"key":"B33-2011-828414","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"B35-2011-828414","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"B36-2011-828414","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2007.4480051"},{"key":"B37-2011-828414","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/791201"},{"first-page":"1","volume-title":"Proceedings of the ACM International Workshop on Wireless Sensor Networks and Applications","author":"Wan C.-Y.","key":"B38-2011-828414"},{"key":"B39-2011-828414","doi-asserted-by":"publisher","DOI":"10.1145\/1180345.1180356"},{"first-page":"78","volume-title":"Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '04)","author":"Wagner D.","key":"B40-2011-828414"},{"key":"B41-2011-828414","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2008.09.006"},{"key":"B42-2011-828414","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2009.04.009"},{"key":"B43-2011-828414","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.237"},{"key":"B44-2011-828414","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2007.18"},{"key":"B45-2011-828414","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2005.12.003"},{"key":"B46-2011-828414","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292835"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/ijdsn\/2011\/828414.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2011\/828414","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full\/10.1155\/2011\/828414","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T14:52:28Z","timestamp":1622213548000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2011\/828414"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1,1]]},"references-count":42,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1,1]]}},"alternative-id":["10.1155\/2011\/828414"],"URL":"https:\/\/doi.org\/10.1155\/2011\/828414","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2011,1,1]]}}}