{"id":"https://openalex.org/W2167002886","doi":"https://doi.org/10.1109/cts.2011.5928697","title":"Secure data aggregation and collaboration in wireless sensor networks","display_name":"Secure data aggregation and collaboration in wireless sensor networks","publication_year":2011,"publication_date":"2011-05-01","ids":{"openalex":"https://openalex.org/W2167002886","doi":"https://doi.org/10.1109/cts.2011.5928697","mag":"2167002886"},"language":"en","primary_location":{"id":"doi:10.1109/cts.2011.5928697","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cts.2011.5928697","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on Collaboration Technologies and Systems (CTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012569039","display_name":"Sanjay Madria","orcid":"https://orcid.org/0000-0002-2768-3660"},"institutions":[{"id":"https://openalex.org/I20382870","display_name":"Missouri University of Science and Technology","ror":"https://ror.org/00scwqd12","country_code":"US","type":"education","lineage":["https://openalex.org/I20382870"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sanjay Kumar Madria","raw_affiliation_strings":["Department of Computer Science, Missouri University of Science and Technology, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Missouri University of Science and Technology, USA","institution_ids":["https://openalex.org/I20382870"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5012569039"],"corresponding_institution_ids":["https://openalex.org/I20382870"],"apc_list":null,"apc_paid":null,"fwci":0.3501,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.66141234,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"273","last_page":"273"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8028748035430908},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7845495939254761},{"id":"https://openalex.org/keywords/data-aggregator","display_name":"Data aggregator","score":0.7599924802780151},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7380273342132568},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5986167788505554},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.5932623147964478},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5727736353874207},{"id":"https://openalex.org/keywords/aggregate","display_name":"Aggregate (composite)","score":0.5309495329856873},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.4856640100479126},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.43822187185287476},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4210849404335022},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.42069560289382935},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3934246301651001},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.3223057985305786},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28328466415405273},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.0846123993396759}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8028748035430908},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7845495939254761},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.7599924802780151},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7380273342132568},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5986167788505554},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.5932623147964478},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5727736353874207},{"id":"https://openalex.org/C4679612","wikidata":"https://www.wikidata.org/wiki/Q866298","display_name":"Aggregate (composite)","level":2,"score":0.5309495329856873},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.4856640100479126},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.43822187185287476},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4210849404335022},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.42069560289382935},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3934246301651001},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3223057985305786},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28328466415405273},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.0846123993396759},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cts.2011.5928697","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cts.2011.5928697","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2011 International Conference on Collaboration Technologies and Systems (CTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.7699999809265137}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2056876401","https://openalex.org/W2145538726"],"related_works":["https://openalex.org/W2100707674","https://openalex.org/W1994220746","https://openalex.org/W2387292094","https://openalex.org/W60586779","https://openalex.org/W2091654030","https://openalex.org/W2054331612","https://openalex.org/W4310501998","https://openalex.org/W2384950545","https://openalex.org/W1971103114","https://openalex.org/W2557309381"],"abstract_inverted_index":{"Data":[0],"aggregation":[1,52,63,96],"is":[2,21,152],"a":[3,18,124],"technique":[4],"used":[5],"to":[6,48,119,134,141],"conserve":[7],"battery":[8],"power":[9],"in":[10,123,154,159],"wireless":[11,125],"sensor":[12,88,126],"networks":[13],"(WSN).":[14],"When":[15],"securing":[16],"such":[17],"network,":[19],"it":[20],"important":[22],"that":[23],"we":[24],"minimize":[25],"the":[26,36,42,87],"number":[27],"of":[28,45,148],"computationally":[29],"expensive":[30],"security":[31],"operations":[32],"without":[33],"compromising":[34],"on":[35,86,98],"security.":[37],"This":[38,76],"talk":[39],"deals":[40],"with":[41],"test-bed":[43],"implementation":[44,147],"our":[46,93,104],"end":[47,49],"secure":[50,62,94],"data":[51,95,113,122,136],"algorithm.":[53],"Unlike":[54],"previous":[55],"algorithms":[56,97,150],"which":[57,115,138,151],"required":[58],"separate":[59],"phases":[60],"for":[61,74,112],"and":[64,83,156],"integrity":[65,137],"verification,":[66],"ours":[67],"does":[68],"not":[69],"require":[70],"an":[71],"additional":[72,81],"phase":[73],"verification.":[75],"saves":[77],"energy":[78,160],"by":[79],"avoiding":[80],"transmissions":[82],"computation":[84],"overhead":[85],"nodes.":[89],"We":[90],"have":[91],"implemented":[92],"mica2":[99],"motes.":[100],"To":[101],"sum":[102],"up":[103],"objectives":[105],"as":[106],"follows:":[107],"1.":[108],"An":[109,129,146],"encryption":[110],"algorithm":[111,133],"confidentiality":[114],"will":[116],"allow":[117],"us":[118,140],"aggregate":[120,130,142],"encrypted":[121],"network.":[127],"2.":[128],"digital":[131,143],"signature":[132],"preserve":[135],"allows":[139],"signatures.":[144],"3.":[145],"these":[149],"efficient":[153],"computational":[155],"communicational":[157],"aspects":[158],"constrained":[161],"environments.":[162]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
