{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:07:14Z","timestamp":1759133234590,"version":"3.37.3"},"reference-count":20,"publisher":"SAGE Publications","issue":"12","license":[{"start":{"date-parts":[[2013,12,1]],"date-time":"2013-12-01T00:00:00Z","timestamp":1385856000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373015","61370050","20103218110017","NP2013307","NZ2013306"],"award-info":[{"award-number":["61373015","61370050","20103218110017","NP2013307","NZ2013306"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373015","61370050","20103218110017","NP2013307","NZ2013306"],"award-info":[{"award-number":["61373015","61370050","20103218110017","NP2013307","NZ2013306"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Doctoral Program of High Education of China","award":["61373015","61370050","20103218110017","NP2013307","NZ2013306"],"award-info":[{"award-number":["61373015","61370050","20103218110017","NP2013307","NZ2013306"]}]},{"DOI":"10.13039\/501100012246","name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","doi-asserted-by":"crossref","award":["61373015","61370050","20103218110017","NP2013307","NZ2013306"],"award-info":[{"award-number":["61373015","61370050","20103218110017","NP2013307","NZ2013306"]}],"id":[{"id":"10.13039\/501100012246","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["61373015","61370050","20103218110017","NP2013307","NZ2013306"],"award-info":[{"award-number":["61373015","61370050","20103218110017","NP2013307","NZ2013306"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004193","name":"Nanjing Aeronautics and Astronautics University","doi-asserted-by":"crossref","award":["61373015","61370050","20103218110017","NP2013307","NZ2013306"],"award-info":[{"award-number":["61373015","61370050","20103218110017","NP2013307","NZ2013306"]}],"id":[{"id":"10.13039\/501100004193","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004193","name":"Nanjing Aeronautics and Astronautics University","doi-asserted-by":"crossref","award":["61373015","61370050","20103218110017","NP2013307","NZ2013306"],"award-info":[{"award-number":["61373015","61370050","20103218110017","NP2013307","NZ2013306"]}],"id":[{"id":"10.13039\/501100004193","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2013,12,1]]},"abstract":"<jats:p> Due to the characteristics of resource-constrained and battery-powered sensors in wireless sensor networks (WSNs), energy consumption is always a major concern. Data aggregation is an essential technique to reduce the communication overhead and energy consumption. Since many applications require data privacy, we need to take security into consideration. In this paper, we propose an energy-efficient, secure, highly accurate, and scalable scheme for data aggregation (EESSDA). The main idea of EESSDA is that secure data aggregation is achieved by establishing secure channel and slicing technology. The EESSDA scheme does not need encryption and decryption operations during the data aggregation, which saves energy and obtain high accuracy of aggregation results. Meanwhile, in EESSDA scheme, the advanced deployment of shared information between nodes is not required, making the networks with good scalability. Our analysis and simulations show that EESSDA is of lower communication overhead, more efficiency and accuracy, and better privacy preservation and scalability than existing schemes. <\/jats:p>","DOI":"10.1155\/2013\/843485","type":"journal-article","created":{"date-parts":[[2013,12,24]],"date-time":"2013-12-24T21:01:20Z","timestamp":1387918880000},"page":"843485","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":14,"title":["An Energy-Efficient and Scalable Secure Data Aggregation for Wireless Sensor Networks"],"prefix":"10.1177","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4717-9303","authenticated-orcid":false,"given":"Taochun","family":"Wang","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China"},{"name":"College of Mathematics and Computer Science, Anhui Normal University, Wuhu, Anhui 241003, China"}]},{"given":"Xiaolin","family":"Qin","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China"}]},{"given":"Liang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China"}]}],"member":"179","published-online":{"date-parts":[[2013,12,24]]},"reference":[{"key":"B1-2013-843485","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.93"},{"first-page":"13","volume-title":"Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys '04)","author":"Xu N.","key":"B2-2013-843485"},{"key":"B3-2013-843485","doi-asserted-by":"publisher","DOI":"10.1002\/047168659X.ch2"},{"volume-title":"Energy Implications of Network Sensor Designs","year":"2000","author":"Szewczyk R.","key":"B4-2013-843485"},{"key":"B5-2013-843485","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.454"},{"first-page":"263","volume-title":"Proceedings of the 5th Annual ACM\/IEEE International Conference on Mobile Computing and Networking","author":"Estrin D.","key":"B6-2013-843485"},{"key":"B7-2013-843485","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502049"},{"key":"B8-2013-843485","first-page":"575","volume-title":"Proceedings of the IEEE 22nd International Conference on Distributed Computing Systems","volume":"2002","author":"Krishnamachari L."},{"first-page":"244","volume-title":"Proceedings 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04)","author":"Yu Y.","key":"B9-2013-843485"},{"key":"B10-2013-843485","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844142"},{"key":"B12-2013-843485","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.237"},{"key":"B13-2013-843485","doi-asserted-by":"publisher","DOI":"10.1145\/1380564.1380568"},{"key":"B14-2013-843485","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753645"},{"key":"B15-2013-843485","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.026"},{"first-page":"3044","volume-title":"Proceedings of the IEEE International Conference on Communications (ICC '05)","author":"Girao J.","key":"B16-2013-843485"},{"key":"B17-2013-843485","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.01.006"},{"key":"B11-2013-843485","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"B18-2013-843485","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935010"},{"first-page":"41","volume-title":"Proceedings of the 9th ACM Conference on Computer and Communications Security","author":"Eschenauer L.","key":"B19-2013-843485"},{"key":"B20-2013-843485","doi-asserted-by":"publisher","DOI":"10.1145\/1052199.1052217"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/843485","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1155\/2013\/843485","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1155\/2013\/843485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,16]],"date-time":"2021-05-16T20:18:36Z","timestamp":1621196316000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1155\/2013\/843485"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,1]]},"references-count":20,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2013,12,1]]}},"alternative-id":["10.1155\/2013\/843485"],"URL":"https:\/\/doi.org\/10.1155\/2013\/843485","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"type":"print","value":"1550-1477"},{"type":"electronic","value":"1550-1477"}],"subject":[],"published":{"date-parts":[[2013,12,1]]}}}