References
[1]. Buttyán, L., Schaffer, P., & Vajda, I. (2006, March).
Resilient aggregation with attack detection in sensor
networks. In Pervasive Computing and Communications
Workshops, 2006. PerCom Workshops 2006. Fourth
Annual IEEE International Conference on (pp. 5-pp). IEEE.
[2]. Chan, H., Perrig, A., & Song, D. (2006, October).
Secure hierarchical in-network aggregation in sensor
th networks. In Proceedings of the 13 ACM Conference on
Computer and Communications Security (pp. 278-287).
ACM.
[3]. Considine, J., Li, F., Kollios, G., & Byers, J. (2004,
March). Approximate aggregation techniques for sensor
th databases. In Data Engineering, 2004. Proceedings. 20
International Conference on (pp. 449-460). IEEE.
[4]. Flajolet, P., & Martin, G. N. (1985). Probabilistic
counting algorithms for database applications. Journal
of Computer and System Sciences, 31(2), 182-209.
[5]. Frikken, K. B., & Dougherty IV, J. A. (2008, March). An
efficient integrity-preserving scheme for hierarchical
sensor aggregation. In Proceedings of the First ACM
Conference on Wireless Network Security (pp. 68-76).
ACM.
[6]. Garofalakis, M., Hellerstein, J. M., & Maniatis, P. (2007,
April). Proof sketches: Verifiable in-network aggregation.
rd In Data Engineering, 2007. ICDE 2007. IEEE 23 International Conference on (pp. 996-1005). IEEE.
[7]. Greenwald, M. B., & Khanna, S. (2004, June). Powerconserving
computation of order-statistics over sensor
networks. In Proceedings of the Twenty-Third ACM
SIGMOD-SIGACT-SIGART Symposium on Principles of
Database Systems (pp. 275-285). ACM.
[8]. Madden, S., Franklin, M. J., Hellerstein, J. M., & Hong,
W. (2002). TAG: A tiny aggregation service for ad-hoc
sensor networks. ACM SIGOPS Operating Systems Review,
36(SI), 131-146.
[9]. Nath, S., Gibbons, P. B., Seshan, S., & Anderson, Z. R.
(2004, November). Synopsis diffusion for robust
nd aggregation in sensor networks. In Proceedings of the 2
International Conference on Embedded Networked
Sensor Systems (pp. 250-262). ACM.
[10]. Przydatek, B., Song, D., & Perrig, A. (2003,
November). SIA: Secure information aggregation in
st sensor networks. In Proceedings of the 1 International Conference on Embedded Networked Sensor Systems
(pp. 255-265). ACM.
[11]. Rahayu, T. M., Lee, S. G., & Lee, H. J. (2015). A secure
routing protocol for wireless sensor networks considering
secure data aggregation. Sensors, 15(7), 15127-15158.
[12]. Wagner, D. (2004, October). Resilient aggregation in
nd sensor networks. In Proceedings of the 2 ACM Workshop
on Security of Ad Hoc and Sensor Networks (pp. 78-87).
ACM.
[13]. Yang, Y., Wang, X., Zhu, S., & Cao, G. (2006). SDAP: A
Secure hop-by-hop Data Aggregation Protocol for sensor
networks. In Proc. Seventh ACM Int. Symp. Mobile Ad Hoc
Networking and Computing (MobiHoc), 2006.
[14]. Zhao, J., Govindan, R., & Estrin, D. (2003, May).
Computing aggregates for monitoring wireless sensor
networks. In Sensor Network Protocols and Applications,
2003. Proceedings of the First IEEE. 2003 IEEE International
Workshop on (pp. 139-148). IEEE.