Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2014 (2014), Article ID 938480, 15 pages
http://dx.doi.org/10.1155/2014/938480
Research Article

TDAL: Thoroughly Data Aggregation of Low Energy Devices in Secure Heterogeneous Wireless Sensor Networks

The Key Laboratory of Communication and Information Systems, Beijing Municipal Commission of Education, Beijing Jiaotong University, Beijing 100044, China

Received 21 April 2014; Accepted 13 October 2014; Published 27 November 2014

Academic Editor: Marco Grassi

Copyright © 2014 Tristan Daladier Engouang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. Madden, M. J. Franklin, J. Hellerstein, and W. Hong, “TAG: a tiny aggregation service for ad-hoc sensor networks,” in Proceedings of the 5th Symposium on Operating System Design and Implementation, Boston, Mass, USA, 2002.
  2. T. D. Engouang, L. Yun, and Z. J. Zhang, “GABs: a game-based secure and energy efficient data aggregation for wireless sensor networks,” International Journal of Distributed Sensor Networks. In press.
  3. J. M. Bahi, C. Guyeux, and A. Makhoul, “Secure data aggregation in wireless sensor networks. Homomorphism versus watermarking approach,” in Proceedings of the 2nd International Conference on Ad Hoc Networks, vol. 49, pp. 344–358, Victoria, Canada, 2010.
  4. T. D. Engouang and L. Yun, “Aggregate over multi-hop homomorphic encrypted data in wireless sensor networks,” in Proceedings of the 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation, pp. 248–252, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  5. V. S. Miller, “Use of elliptic curves in cryptography,” in Advances in Cryptology—CRYPTO'85 Proceedings, H. C. Williams, Ed., vol. 218 of Lecture Notes in Computer Science, pp. 417–426, Springer, New York, NY, USA, 1985. View at Publisher · View at Google Scholar
  6. N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  7. H.-Y. Shi, W.-L. Wang, N.-M. Kwok, and S.-Y. Chen, “Game theory for wireless sensor networks: a survey,” Sensors, vol. 12, no. 7, pp. 9055–9097, 2012. View at Publisher · View at Google Scholar · View at Scopus
  8. A. P. Azad, E. Altman, and R. El-Azouzi, “Routing games: from egoism to altruism,” in Proceedings of the 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt '10), pp. 528–537, Avignon, France, June 2010. View at Scopus
  9. T. D. Engouang, Y. Liu, and Z. J. Zhang, “Chapter 6: measurement technology, instruments and sensors, detection technologies,” in Mechatronics and Industrial Informatics II, P. Yarlagadda and S.-B. Choi, Eds., vol. 596 of Applied Mechanics and Materials, pp. 519–527, 2014. View at Publisher · View at Google Scholar
  10. M. Michalopoulou and P. Mähönen, “Game theory for wireless networking: is a Nash equilibrium always a desirable solution?” in Proceedings of the IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '12), pp. 1249–1255, September 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. C.-X. Liu, Y. Liu, Z.-J. Zhang, and Z.-Y. Cheng, “High energy-efficient and privacy-preserving secure data aggregation for wireless sensor networks,” International Journal of Communication Systems, vol. 26, no. 3, pp. 380–394, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. E. Chui, J. Lin, B. Mcfrron, N. Petigara, and S. Seshasai, Mathematical Theory of Claude Shannon, 2001.
  13. Y. Mao, P. Zhu, and G. Wei, “A game theoretic model for wireless sensor networks with hidden-action attacks,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 836056, 9 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. W. R. Hamilton, Wikipedia-Hamiltonian path, 2014, http://en.wikipedia.org/wiki/Hamiltonian_path.
  15. E. W. Weisstein, Hamiltonian Cycle, April 2013, http://mathworld.wolfram.com/HamiltonianCycle.html.
  16. J. Kleinberg and E. Tardos, Algorithm Design, Pearson Education, Tsinghua Univerisity Press and Prentice Hall, Beijing, China, 2006.
  17. C. Li and Y. Liu, “ESMART: energy-efficient slice-mix-aggregate for wireless sensor network,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 134509, 9 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. G. de Meulenaer, F. Gosset, O.-X. Standaert, and O. Pereira, “On the energy cost of communication and cryptography in wireless sensor networks,” in Proceedings of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communication (WiMob '08), pp. 580–585, Avignon, France, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  19. J. Huang, L. Wang, and D. Schonfeld, “Compressed-sensing game theory (CSGT): a novel polynomial complexity solution to Nash equilibria in dynamical games,” in Proceedings of the 38th IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP '13), pp. 6551–6555, Vancouver, Canada, May 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. L. Hui, J. Li, H. Li, and Y. Ma, “Negotiation-based TDMA scheme for Ad Hoc networks from game Theoretical Perspective,” China Communications, vol. 8, no. 7, pp. 66–74, 2011. View at Google Scholar · View at Scopus
  21. A. Giusti, A. L. Murphy, and G. P. Picco, “Decentralized scattering of wake-up times in wireless sensor networks,” in Wireless Sensor Networks: 4th European Conference on Wireless Sensor Networks (EWSN '04), January 29–31, 2007, Delft, The Netherlands, vol. 4373 of Lecture Notes in Computer Science, pp. 245–260, 2007. View at Publisher · View at Google Scholar
  22. T. D. Engouang and L. Yun, “The characteristics of spread spectrum CDMA based systems and China market impacts,” in Proceedings of the 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '12), pp. 1–8, IEEE, Shanghai, China, September 2012. View at Publisher · View at Google Scholar · View at Scopus
  23. T. D. Engouang, L. Yun, and Z. J. Zhang, “Pallier based homomorphic encrypted data aggregation in wireless sensor networks,” Applied Mechanics and Materials, vol. 543–547, pp. 3017–3022, 2014. View at Publisher · View at Google Scholar · View at Scopus
  24. MICAZ-Memsic, memsic.com., January 2014, http://www.memsic.com/userfiles/files/Datasheets/WSN/micaz_datasheet-t.pdf.
  25. IRIS-Memsic, memsic.com, 2014, http://www.memsic.com/userfiles/files/Datasheets/WSN/IRIS_Datasheet.pdf.
  26. W. He, X. Liu, H. Viet, K. Nahrstedt, and T. Abdelzaher, “PDA: privacy-preserving data aggregation for information collection,” ACM Transactions on Sensor Networks, vol. 8, no. 1, article 6, 2011. View at Publisher · View at Google Scholar · View at Scopus
  27. C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proceedings of the 41st Annual ACM Symposium on Theory of Computing (STOC '09), pp. 169–178, Bethesda, Md, USA, 2009.