less sensor networks: a survey. Wireless Communications, IEEE, Vol.14, No.2, pp.70,87,
April 2007.
2. Chris Karlof, Naveen Sastry, David Wagner. TinySec: A link layer security architecture for
wireless sensor networks. InProceedings of the 2
nd
international conference on Embedded
Networked Sensor Systems SenSys '04, ACM, New York, NY, USA, pp. 162-175, 2004.
3. Tieyan Li, Hongjun Wu, Xinkai Wang, Feng Bao. SenSec: Sensor Security Framework for
TinyOS. In Proceedings of the Second International Workshop on Networked Sensing Sys-
tems, San Diego, California, USA, pp.145-150, 2005.
4. Ramesh Rajagopalan and Pramod K. Varshney. Data aggregation techniques in sensor net-
works: A survey. Comm. Surveys Tutorials, IEEE, Vol. 8, pp. 48–63, 2006.
5. VivakshaJariwala, Asha Munjpara, DeveshJinwala, Dhiren Patel. Comparative Evaluation
of ECC Based Homomorphic Encryption Algorithms in TOSSIM for Wireless Sensor Net-
works. In Proceedings of the National Workshop on Cryptology, Cryptology Research Soci-
ety of India and VIT, Vellore, TN, pp. 1-14, 2012.
6. Don Johnson, Alfred Menezes and Scott Vanstone.The Elliptic Curve Digital Signature
Algorithm (ECDSA).International Journal of Information Security, Vol. 1, No. 1, Springer-
Verlag, pp. 36-63, 2001.
7. Alzaid Hani, Foo Ernest, and Nieto Juan Gonzalez. Secure data aggregation in wireless
sensor network: a survey. In Proceedings of the sixth Australasian conference on Infor-
mation security (AISC ’08), Australian Computer Society, pp. 93–105, 2008.
8. Josep Ferrer and Domingo.A new privacy homomorphism and applications.Inf. Process.
Lett., Vol. 60, No. 5, pp. 277–282, 1996.
9. Xiaoyan Wang; Jie Li; Xiaoning Peng; BeijiZou.Secure and Efficient Data Aggregation for
Wireless Sensor Networks. In Proceeding of the Vehicular Technology Conference Fall
(VTC 2010-Fall), 2010 IEEE 72nd , pp.1-5, 6-9 Sept. 2010.
10.ClaudeCastelluccia, EinarMykletun, and Gene Tsudik. Effcient aggregation of encrypted
data in wireless sensor networks.In Proceeding of the MobiQuitous, IEEE Computer Socie-
ty, pp. 109–117, 2005.
11.Poornima, A.S.; Amberker, B.B. SEEDA: Secure end-to-end data aggregation in Wireless
Sensor Networks. In Proceeding of the 7
th
International Conference of Wireless And Optical
Communications Networks (WOCN), pp.1-5, 6-8 Sept. 2010.
12. Jacques M. Bahi, Christophe Guyeux, and AbdallahMakhoul. Efficient and Robust Secure
Aggregation of Encrypted Data in Sensor Networks. In Proceedings of the 2010 Fourth In-
ternational Conference on Sensor Technologies and Applications (SENSORCOMM '10),
IEEE Computer Society, Washington, DC, USA, pp. 472-477, 2010.
13. SuatOzdemir and Yang Xiao. Integrity protecting hierarchical concealed data aggregation
for wireless sensor networks.Comput.Netw., Vol. 55, No. 8, pp. 1735-1746, 2011.
14. SuatOzdemir and Yang Xiao. Hierarchical Concealed Data Aggregation for Wireless Sensor
Networks, 2009.
15. AjayJangra, Priyanks and Richa. Cb-SDA: Cluster-based Secure Data Aggregation for
Private Data in WSN. Wireless and Mobile Technologies, Vol. 1, No. 1,Science and Educa-
tion Publishing pp. 37-41, 2013.
16 .Shaik Mohammad Rafi and K. Subbarao. Secure Data Aggregation In Wireless Networks.
International Journal of Research in Computer and Communication Technology, Vol 3, Is-
sue 1, pp. 87-93, January- 2014
17. TaochunWang,Xiaolin Qinand Liang Liu. An Energy-Efficient and Scalable Secure Data
Aggregation for Wireless Sensor Networks.International Journal of Distributed Sensor Net-
works.Volume 2013.
18. J. Hill, et al. System Architecture Directions for Networked Sensors. In Proceedings of 9th
Intl. Conf. on Architectural Support for Programming Languages and Operating Systems
(ASPLOS 2000), ACM Press, pp. 93-104, 2000.
19. A. Liu, P. Kampanakis, P. Ning. TinyECC: Elliptic curve cryptography for sensor networks.
In Proceedings of the International Conference on Information Processing in Sensor Net
59