Secure data aggregation in wireless sensor networks: A comprehensive overview

S Ozdemir, Y Xiao - Computer Networks, 2009 - Elsevier
Wireless sensor networks often consists of a large number of low-cost sensor nodes that
have strictly limited sensing, computation, and communication capabilities. Due to resource …

Providing source location privacy in wireless sensor networks: A survey

M Conti, J Willemsen, B Crispo - … Communications Surveys & …, 2013 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) consist of numerous small nodes that can sense, collect,
and disseminate information for many different types of applications. One of these …

Sok: Secure aggregation based on cryptographic schemes for federated learning

M Mansouri, M Önen, WB Jaballah… - Proceedings on Privacy …, 2023 - petsymposium.org
Secure aggregation consists of computing the sum of data collected from multiple sources
without disclosing these individual inputs. Secure aggregation has been found useful for …

EPPA: An efficient and privacy-preserving aggregation scheme for secure smart grid communications

R Lu, X Liang, X Li, X Lin, X Shen - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The concept of smart grid has emerged as a convergence of traditional power system
engineering and information and communication technology. It is vital to the success of next …

Order-preserving symmetric encryption

A Boldyreva, N Chenette, Y Lee, A O'neill - Advances in Cryptology …, 2009 - Springer
We initiate the cryptographic study of order-preserving symmetric encryption (OPE), a
primitive suggested in the database community by Agrawal et al.(SIGMOD'04) for allowing …

Online placement of multi-component applications in edge computing environments

S Wang, M Zafer, KK Leung - IEEE access, 2017 - ieeexplore.ieee.org
Mobile edge computing is a new cloud computing paradigm, which makes use of small-
sized edge clouds to provide real-time services to users. These mobile edge-clouds (MECs) …

Efficient and provably secure aggregation of encrypted data in wireless sensor networks

C Castelluccia, ACF Chan, E Mykletun… - ACM Transactions on …, 2009 - dl.acm.org
Wireless sensor networks (WSNs) are composed of tiny devices with limited computation
and battery capacities. For such resource-constrained devices, data transmission is a very …

A privacy-preserving homomorphic scheme with multiple dimensions and fault tolerance for metering data aggregation in smart grid

A Mohammadali, MS Haghighi - IEEE Transactions on Smart …, 2021 - ieeexplore.ieee.org
Advanced Metering Infrastructure (AMI) facilitates the communication between smart meters
and network operators in smart grid. For better demand-response management, smart …

Fault attacks on AES with faulty ciphertexts only

T Fuhr, É Jaulmes, V Lomné… - 2013 Workshop on Fault …, 2013 - ieeexplore.ieee.org
Classical Fault Attacks often require the ability to encrypt twice the same plaintext, in order to
get one or several pairs of correct and faulty cipher texts corresponding to the same …

Trade-offs in the design of a router with both guaranteed and best-effort services for networks on chip

E Rijpkema, K Goossens, A Rădulescu, J Dielissen… - … -Computers and Digital …, 2003 - IET
Managing the complexity of designing chips containing billions of transistors requires
decoupling computation from communication. For the communication, scalable and …