The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Wireless sensor network is an important part of the Internet of Things. Preservation of privacy and integrity in wireless sensor networks is extremely urgent and challenging. This paper proposes an efficient mechanism, called PTK, for define and solve the practical and challenging problem of privacy-preserving and verifiable Top-k query processing in two-tier sensor network. PTK prevents adversaries...
Wireless Sensor Network is an important part of the Internet of Things. Data privacy preservation in wireless sensor networks is extremely urgent and challenging. To address this problem, we propose in this paper a privacy-preserving data aggregation protocol in wireless sensor networks. Compared to the previous research, our protocol protects the actual data from other nodes based on a rotation scheme...
Wireless sensor network is an important part of the Internet of Things. Preservation of privacy and integrity in wireless sensor networks is extremely urgent and challenging. To address this problem, we propose in this paper an efficient and secure range query protocol in two-tiered wireless sensor networks introducing master nodes. Our proposal not only prevents adversaries from gaining sensitive...
Nowadays, Wireless Sensor Network (WSN) is becoming a hot topic after the "Sensor China" concept proposed in 2009. Sensor nodes are deployed in a hostile or unattended environment to collect the data information. Therefore, network security has become a big problem. A new key management scheme of security network architecture for wireless sensor network is presented in this paper. The proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.