368
Views
17
CrossRef citations to date
0
Altmetric
Original Articles

Secure data aggregation in wireless sensor networks using homomorphic encryption

, &
Pages 690-702 | Received 26 Mar 2013, Accepted 01 Jan 2014, Published online: 08 Aug 2014

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (2)

Vishal Krishna Singh, Rahul Verma & Manish Kumar. (2017) Energy Efficient Event Detection Using Probabilistic Inference in Wireless Sensor Networks. IETE Journal of Research 63:6, pages 834-844.
Read now
Mahalakshmi Gunasekaran & Subathra Periakaruppan. (2017) A hybrid protection approaches for denial of service (DoS) attacks in wireless sensor networks. International Journal of Electronics 104:6, pages 993-1007.
Read now

Articles from other publishers (15)

A. Vijaya Krishna, I. Ravi Prakash Reddy, A. Anny Leema & M. Dinesh. 2023. Intelligent Computing and Communication. Intelligent Computing and Communication 441 449 .
Tanya Koohpayeh Araghi, David Megías & Andrea Rosales. 2023. Intelligent Computing. Intelligent Computing 651 667 .
R. S. Raghav, U. Prabu, M. Rajeswari, D. Saravanan & Kalaipriyan Thirugnanasambandam. (2021) Cuddle death algorithm using ABC for detecting unhealthy nodes in wireless sensor networks. Evolutionary Intelligence 15:3, pages 1605-1617.
Crossref
Ahmed Salim, Walid Osamy, Ahmed Aziz & Ahmed M. Khedr. (2022) SEEDGT: Secure and energy efficient data gathering technique for IoT applications based WSNs. Journal of Network and Computer Applications 202, pages 103353.
Crossref
A. Vijaya Krishna & A. Anny Leema. 2022. Modern Approaches in Machine Learning & Cognitive Science: A Walkthrough. Modern Approaches in Machine Learning & Cognitive Science: A Walkthrough 295 303 .
Feiyan Han & Bo Li. (2020) Exploring the effect of an enhanced e-commerce institutional mechanism on online shopping intention in the context of e-commerce poverty alleviation. Information Technology & People 34:1, pages 93-122.
Crossref
Vishal Krishna Singh, Bhoomika Nathani & Manish Kumar. (2020) WEED-MC : Wavelet Transform for Energy Efficient Data Gathering and Matrix Completion . IEEE Transactions on Parallel and Distributed Systems 31:5, pages 1066-1073.
Crossref
Khaled Hadi. (2019) Analysis of Exploiting Geographic Routing for Data Aggregation in Wireless Sensor Networks. Procedia Computer Science 151, pages 439-446.
Crossref
Arwa Alromih, Mznah Al-Rodhaan & Yuan Tian. (2018) A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications. Sensors 18:12, pages 4346.
Crossref
Ting Li, Yuxin Liu, Neal N. Xiong, Anfeng Liu, Zhiping Cai & Houbing Song. (2018) Privacy-Preserving Protocol for Sink Node Location in Telemedicine Networks. IEEE Access 6, pages 42886-42903.
Crossref
Abdul Razaque & Syed S. Rizvi. (2017) Secure data aggregation using access control and authentication for wireless sensor networks. Computers & Security 70, pages 532-545.
Crossref
José M. de Fuentes, Lorena González-Manzano, Juan Tapiador & Pedro Peris-Lopez. (2017) PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing. Computers & Security 69, pages 127-141.
Crossref
Hua Shen, Mingwu Zhang & Jian Shen. (2017) Efficient Privacy-Preserving Cube-Data Aggregation Scheme for Smart Grids. IEEE Transactions on Information Forensics and Security 12:6, pages 1369-1381.
Crossref
L. González-Manzano, José M. de Fuentes, Sergio Pastrana, Pedro Peris-Lopez & Luis Hernández-Encinas. (2016) PAgIoT – Privacy-preserving Aggregation protocol for Internet of Things. Journal of Network and Computer Applications 71, pages 59-71.
Crossref
Haythem Hayouni & Mohamed Hamdi. (2016) Secure data aggregation with homomorphic primitives in wireless sensor networks: A critical survey and open research issues. Secure data aggregation with homomorphic primitives in wireless sensor networks: A critical survey and open research issues.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.