{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T10:55:05Z","timestamp":1775040905311,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T00:00:00Z","timestamp":1529280000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"the First-Class University and the First-Class Discipline","award":["10301-017004011501"],"award-info":[{"award-number":["10301-017004011501"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13638-018-1173-7","type":"journal-article","created":{"date-parts":[[2018,6,18]],"date-time":"2018-06-18T12:56:29Z","timestamp":1529326589000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A resilient data aggregation method based on spatio-temporal correlation for wireless sensor networks"],"prefix":"10.1186","volume":"2018","author":[{"given":"Yong","family":"Lu","sequence":"first","affiliation":[]},{"given":"Na","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,18]]},"reference":[{"key":"1173_CR1","first-page":"223","volume-title":"Proceedings of the 4th international conference on network and system security, NSS\u201910","author":"A Apavatjrut","year":"2010","unstructured":"A Apavatjrut, W Znaidi, A Fraboulet, C Goursaud, et al., in Proceedings of the 4th international conference on network and system security, NSS\u201910. Energy friendly integrity for network coding in wireless sensor networks (IEEE, Melbourne, 2010), pp. 223\u2013230"},{"key":"1173_CR2","first-page":"160","volume-title":"Proceedings of the 20th EUNICE\/IFIP workshop on advances in communication networking, EUNICE\u201914, Lecture Notes in Computer Science","author":"K Parmar","year":"2014","unstructured":"K Parmar, DC Jinwala, in Proceedings of the 20th EUNICE\/IFIP workshop on advances in communication networking, EUNICE\u201914, Lecture Notes in Computer Science. Malleability resilient concealed data aggregation, vol 8846 (2014), pp. 160\u2013172"},{"issue":"3","key":"1173_CR3","doi-asserted-by":"publisher","first-page":"1221","DOI":"10.1016\/j.adhoc.2012.08.011","volume":"11","author":"MA Simplicio Jr","year":"2013","unstructured":"MA Simplicio Jr, BT De Oliveira, CB Margi, et al., Survey and comparison of message authentication solutions on wireless sensor networks. Ad. Hoc. Netw.. 11(3), 1221\u20131236 (2013)","journal-title":"Ad. Hoc. Netw.."},{"key":"1173_CR4","first-page":"1","volume-title":"Proceedings of the 4th IEEE international workshop on data security and privacy in wireless networks, D-SPAN\u201913","author":"D Westhoff","year":"2013","unstructured":"D Westhoff, O Ugus, in Proceedings of the 4th IEEE international workshop on data security and privacy in wireless networks, D-SPAN\u201913. Malleability resilient (premium) concealed data aggregation (IEEE, Madrid, 2013), pp. 1\u20136"},{"key":"1173_CR5","unstructured":"S Sicari, LA Grieco, G Boggia, et al., DyDAP: a dynamic data aggregation scheme for privacy aware wireless sensor networks. J. Syst. Softw. 85(1), 152\u2013166 (2012)"},{"issue":"2","key":"1173_CR6","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/JCN.2013.000029","volume":"15","author":"M Mansouri","year":"2013","unstructured":"M Mansouri, L Khoukhi, H Nounou, Secure and robust clustering for quantized target tracking in wireless sensor networks. J. Commun. Netw. 15(2), 164\u2013172 (2013)","journal-title":"J. Commun. Netw."},{"issue":"3","key":"1173_CR7","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.jcss.2013.06.014","volume":"80","author":"G Han","year":"2014","unstructured":"G Han, J Jiang, L Shu, J Niu, HC Chao, Managements and applications of trust in wireless sensor networks: a survey. J. Comput. Syst. Sci. 80(3), 602\u2013617 (2014)","journal-title":"J. Comput. Syst. Sci."},{"key":"1173_CR8","first-page":"101","volume":"23","author":"L Lv","year":"2010","unstructured":"L Lv, L Hong, N Zhang, Hierarchical routing trust model for wireless sensor networks. Comput. Eng. 23, 101\u2013103 (2010)","journal-title":"Comput. Eng."},{"key":"1173_CR9","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1007\/s11276-009-0182-1","volume":"16","author":"H Safa","year":"2010","unstructured":"H Safa, H Artail, D Tabet, A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wirel. Netw 16, 969\u2013984 (2010)","journal-title":"Wirel. Netw"},{"issue":"11","key":"1173_CR10","first-page":"2636","volume":"31","author":"H Xiangdong","year":"2010","unstructured":"H Xiangdong, W Qinfang, T Hui, Model and simulation of creditability-based data aggregation for the internet of things. Chin. J. Sci. Instrum. 31(11), 2636\u20132640 (2010)","journal-title":"Chin. J. Sci. Instrum."},{"issue":"3","key":"1173_CR11","first-page":"454","volume":"30","author":"Z Nan","year":"2009","unstructured":"Z Nan, Z Jianhua, L Zhishu, Data fusion mechanisms based on immune in wireless sensor network. J. Chin. Comput. Syst. 30(3), 454\u2013459 (2009)","journal-title":"J. Chin. Comput. Syst."},{"issue":"3","key":"1173_CR12","first-page":"33","volume":"3","author":"K Liu","year":"2015","unstructured":"K Liu, T Du, S Qu, The research of high efficient and real time data aggregation method applied in WSNs. J. Sens. Technol. Appl. 3(3), 33\u201346 (2015)","journal-title":"J. Sens. Technol. Appl."},{"key":"1173_CR13","first-page":"1704","volume":"12","author":"L Qiu","year":"2014","unstructured":"L Qiu, T Liu, D Lin, et al., Data aggregation in wireless sensor network based on deep learning model. Chin. J. Sens. Actuators 12, 1704\u20131709 (2014)","journal-title":"Chin. J. Sens. Actuators"},{"key":"1173_CR14","first-page":"664","volume":"5","author":"H Cui","year":"2014","unstructured":"H Cui, J Pan, D Yan, Malicious nodes detection algorithm based on secure data fusion in wireless sensor networks. Chin. J. Sens. Actuators 5, 664\u2013669 (2014)","journal-title":"Chin. J. Sens. Actuators"},{"key":"1173_CR15","first-page":"594","volume-title":"Proc. of IEEE Fourth International Conference on Big Data and Cloud Computing","author":"T Du","year":"2014","unstructured":"T Du, S Qu, Q Guo, et al., in Proc. of IEEE Fourth International Conference on Big Data and Cloud Computing. A high efficient real time data aggregation algorithm for WSNs (2014), pp. 594\u2013598"},{"key":"1173_CR16","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1029102.1029116","volume-title":"Proc. of the 2nd ACM Workshop on Security in Ad Hoc and Sensor Networks","author":"D Wager","year":"2004","unstructured":"D Wager, in Proc. of the 2nd ACM Workshop on Security in Ad Hoc and Sensor Networks. Resilient aggregation in sensor networks (ACM Press, New York, 2004), pp. 78\u201387"},{"key":"1173_CR17","doi-asserted-by":"crossref","unstructured":"L Buttyan, P Schaffer, I Vajda, in Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks. RANBAR: RANSAC-based resilient aggregation in sensor networks (ACM, Alexandria, 2006), pp. 83\u201390","DOI":"10.1145\/1180345.1180356"},{"key":"1173_CR18","first-page":"90","volume":"1","author":"YJ Luo","year":"2011","unstructured":"YJ Luo, XY Ding, XG Luo, et al., Effective method for resilient data aggregation in wireless sensor networks. J. Data Acquis. Process. 1, 90\u201394 (2011)","journal-title":"J. Data Acquis. Process."},{"key":"1173_CR19","first-page":"3405","volume":"9","author":"YJ Luo","year":"2012","unstructured":"YJ Luo, DY Shi, YT Hou, et al., Resilient data aggregation method based on similarity in wireless sensor networks. Appl. Res. Comput. 9, 3405\u20133407 (2012)","journal-title":"Appl. Res. Comput."},{"issue":"3","key":"1173_CR20","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1007\/s11277-015-2633-6","volume":"87","author":"K Parmar","year":"2016","unstructured":"K Parmar, DC Jinwala, Malleability resilient concealed data aggregation in wireless sensor networks. Wirel. Pers. Commun. 87(3), 971\u2013993 (2016)","journal-title":"Wirel. Pers. Commun."},{"key":"1173_CR21","first-page":"3005","volume-title":"Proc. of the 33rd Hawaii Int\u2019l Conf. on System Science (HICSS 2000)","author":"WR Heinzelman","year":"2000","unstructured":"WR Heinzelman, A Chandrakasan, H Balakrishnan, in Proc. of the 33rd Hawaii Int\u2019l Conf. on System Science (HICSS 2000). Energy-efficient communication protocol for wireless microsensor networks (2000), pp. 3005\u20133014"},{"issue":"12","key":"1173_CR22","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.swevo.2013.04.002","volume":"24","author":"P Kuila","year":"2013","unstructured":"P Kuila, SK Gupta, PK Jana, A novel evolutionary approach for load balanced clustering problem for wireless sensor networks. Swarm Evol. Comput. 24(12), 48\u201356 (2013)","journal-title":"Swarm Evol. Comput."},{"issue":"3","key":"1173_CR23","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1016\/j.comnet.2004.03.007","volume":"45","author":"MC Vuran","year":"2004","unstructured":"MC Vuran, B Akan, F AkyildizI, Spatio-temporal correlation: theory and applications for wireless sensor networks. Comput. Netw. 45(3), 245\u2013259 (2004)","journal-title":"Comput. Netw."},{"issue":"1","key":"1173_CR24","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1166\/sl.2012.1866","volume":"10","author":"C Mi","year":"2012","unstructured":"C Mi, D Zhu, BA Engel, et al., Research on probability distribution of extreme wind speed in maize growth period. Sens. Lett. 10(1), 535\u2013540 (2012)","journal-title":"Sens. Lett."},{"issue":"5","key":"1173_CR25","doi-asserted-by":"publisher","first-page":"1743","DOI":"10.1016\/j.jnca.2011.06.007","volume":"34","author":"HC Ma","year":"2011","unstructured":"HC Ma, PK Sahoo, YW Chen, Computational geometry based distributed coverage hole detection protocol in wireless sensor networks. J. Netw. Comput. Appl. 34(5), 1743\u20131756 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"7","key":"1173_CR26","doi-asserted-by":"publisher","first-page":"2017","DOI":"10.1007\/s00521-015-1995-8","volume":"27","author":"S Ridvan","year":"2016","unstructured":"S Ridvan, L Peide, Maximizing deviation method for neutrosophic multiple attribute decision making with incomplete weight information. Neural Comput. Appl. 27(7), 2017\u20132029 (2016)","journal-title":"Neural Comput. Appl."},{"issue":"4","key":"1173_CR27","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1515\/jmc-2015-0042","volume":"9","author":"KJ Henry","year":"2015","unstructured":"KJ Henry, DR Stinson, Linear approaches to resilient aggregation in sensor networks. J. Math. Cryptol. 9(4), 245\u2013272 (2015)","journal-title":"J. Math. Cryptol."},{"key":"1173_CR28","first-page":"2053","volume-title":"Proc. of 23rd European Signal Processing Conference (EUSIPCO), Nice, France, Aug 31-Sep 04","author":"R Lopez-Valcarce","year":"2015","unstructured":"R Lopez-Valcarce, D Romero, in Proc. of 23rd European Signal Processing Conference (EUSIPCO), Nice, France, Aug 31-Sep 04. Attack detectors for data aggregation in clustered sensor networks (2015), pp. 2053\u20132057"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1173-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-018-1173-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1173-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T23:08:57Z","timestamp":1560812937000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-018-1173-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,18]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["1173"],"URL":"https:\/\/doi.org\/10.1186\/s13638-018-1173-7","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,18]]},"assertion":[{"value":"5 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"157"}}