ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Secure Data Aggregation Protocol for M2M Communications
Mapping Intimacies
◽
10.21236/ada627065
◽
2015
◽
Author(s):
Rongxing Lu
Keyword(s):
Data Aggregation
◽
M2m Communications
◽
Secure Data
◽
Secure Data Aggregation
Download Full-text
Related Documents
Cited By
References
Ultra-reliable secure data aggregation scheme with low latency for isolated terminals in 5G and beyond defined STINs
Computer Standards & Interfaces
◽
10.1016/j.csi.2021.103512
◽
2021
◽
pp. 103512
Author(s):
Chen Wang
◽
Jian Shen
◽
Pandi Vijayakumar
◽
Qi Liu
◽
Sai Ji
Keyword(s):
Data Aggregation
◽
Low Latency
◽
Secure Data
◽
Aggregation Scheme
◽
Secure Data Aggregation
Download Full-text
Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review
Journal of Network and Computer Applications
◽
10.1016/j.jnca.2021.103118
◽
2021
◽
pp. 103118
Author(s):
Mohammad Sadegh Yousefpoor
◽
Efat Yousefpoor
◽
Hamid Barati
◽
Ali Barati
◽
Ali Movaghar
◽
...
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Data Aggregation
◽
Wireless Sensor
◽
Comprehensive Review
◽
Aggregation Methods
◽
Secure Data
◽
Secure Data Aggregation
Download Full-text
Secure data aggregation scheme based on node self-adaptive monitoring for wireless sensor networks
International Journal of Vehicle Information and Communication Systems
◽
10.1504/ijvics.2021.115254
◽
2021
◽
Vol 6
(2)
◽
pp. 137
Author(s):
Shuguang Zhang
◽
Qian Wang
◽
Yichen Wu
◽
Hao Wang
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Data Aggregation
◽
Wireless Sensor
◽
Adaptive Monitoring
◽
Secure Data
◽
Aggregation Scheme
◽
Secure Data Aggregation
◽
Self Adaptive
Download Full-text
Fog Computing: Applications and Secure Data Aggregation
Handbook of Computer Networks and Cyber Security
◽
10.1007/978-3-030-22277-2_19
◽
2020
◽
pp. 475-492
◽
Cited By ~ 2
Author(s):
Sudesh Rani
◽
Poonam Saini
Keyword(s):
Data Aggregation
◽
Fog Computing
◽
Secure Data
◽
Secure Data Aggregation
Download Full-text
Hierarchical Approach to Secure Data Aggregation in Wireless Sensor Networks
Indian Journal of Science and Technology
◽
10.17485/ijst/2015/v8i14/62529
◽
2015
◽
Vol 8
(14)
◽
Author(s):
S. Saranya
◽
N. Bharathi
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Data Aggregation
◽
Wireless Sensor
◽
Hierarchical Approach
◽
Secure Data
◽
Secure Data Aggregation
Download Full-text
Secure Data Aggregation in Wireless Sensor Networks
Computer Communications and Networks - Guide to Wireless Sensor Networks
◽
10.1007/978-1-84882-218-4_21
◽
2009
◽
pp. 533-559
◽
Cited By ~ 1
Author(s):
Yee Wei Law
◽
Marimuthu Palaniswami
◽
Raphael Chung-Wei Phan
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Data Aggregation
◽
Wireless Sensor
◽
Secure Data
◽
Secure Data Aggregation
Download Full-text
A Pairwise Key Distribution Mechanism and Distributed Trust Evaluation Model for Secure Data Aggregation in Mobile Sensor Networks ............................. NATARAJAN MEGHANATHAN
Emerging Communication Technologies Based on Wireless Sensor Networks
◽
10.1201/b20085-22
◽
2016
◽
pp. 324-353
Keyword(s):
Sensor Networks
◽
Data Aggregation
◽
Evaluation Model
◽
Mobile Sensor Networks
◽
Key Distribution
◽
Trust Evaluation
◽
Mobile Sensor
◽
Secure Data
◽
Secure Data Aggregation
Download Full-text
False Data Detection and Secure Data Aggregation in Wireless Sensor Networks
Security in Distributed, Grid, Mobile, and Pervasive Computing
◽
10.1201/9780429119347-9
◽
2007
◽
pp. 129-157
Author(s):
Hasan Çam
◽
Suat Ozdemir
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Data Aggregation
◽
Wireless Sensor
◽
Data Detection
◽
Secure Data
◽
Secure Data Aggregation
◽
False Data Detection
Download Full-text
Secure data aggregation with privacy-protection in smart grid
Computer Science and Applications
◽
10.1201/b18508-14
◽
2015
◽
pp. 77-84
Keyword(s):
Smart Grid
◽
Data Aggregation
◽
Privacy Protection
◽
Secure Data
◽
Secure Data Aggregation
Download Full-text
Secure data aggregation in heterogeneous and disparate networks using stand off server architecture
10.1117/12.818575
◽
2009
◽
Author(s):
S. Vimalathithan
◽
S. D. Sudarsan
◽
R. Seker
◽
R. B. Lenin
◽
S. Ramaswamy
Keyword(s):
Data Aggregation
◽
Secure Data
◽
Secure Data Aggregation
◽
Server Architecture
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close