[1]SHENG B, LI Q. Verifiable privacypreserving range query in twotiered sensor networks[C]//INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, 2008.[2]ROBERT S, ANDRAS F. Energy implication of network sensor designs[J]. (20080401)[20150630]. http://www. cs. berkeley. edu/zewczyk/cs252/paper.pdf.[3]GNAWALI O, JANG K Y, PAEK J, et al. The tenet architecture for tiered sensor networks[C]//Proceedings of the 4th international conference on Embedded networked sensor systems. ACM, 2006: 153166.[4]HACIGMSH, IYER B, LI C, et al. Executing SQL over encrypted data in the databaseserviceprovider model[C]//Proceedings of the 2002 ACM SIGMOD international conference on Management of data. ACM, 2002: 216227.[5]HORE B, MEHROTRA S, TSUDIK G. A privacypreserving index for range queries[C]//Proceedings of the Thirtieth international conference on Very large data basesVolume 30. VLDB Endowment, 2004: 720731.[6]SHENG B, LI Q. Verifiable privacypreserving sensor network storage for range query[J]. Mobile Computing IEEE Transactions on, 2011, 10(9): 13121326.[7]SHI J, ZHANG Y. Secure range queries in tiered sensor networks[C]//INFOCOM 2009, IEEE. IEEE, 2009: 945953.[8]SHI J, ZHANG R, ZHANG Y. A spatiotemporal approach for secure range queries in tiered sensor networks[J]. IEEE transactions on wireless communications, 2011, 10(1): 264273.[9]ZHANG R, SHI J, ZHANG Y. Secure multidimensional range queries in sensor networks[C]//Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing. ACM, 2009: 197206.[10]CHENG J, YANG H, WONG S H Y, et al. Design and implementation of crossdomain cooperative firewall[C]//Network Protocols, ICNP 2007. IEEE International Conference on, 2007: 284293.[11]LIU A X, CHEN F. Collaborative enforcement of firewall policies in virtual private networks[C]//Proceedings of the twentyseventh ACM symposium on Principles of distributed computing. ACM, 2008: 95104.[12]CHEN F, LIU A X. SafeQ: Secure and efficient query processing in sensor networks[C]//INFOCOM, 2010 Proceedings IEEE. IEEE, 2010: 19.[13]CHEN F, LIU A X. Privacyand integritypreserving range queries in sensor networks[J]. Networking, IEEE/ACM Transactions on, 2012, 20(6): 17741787.[14]BOLDYREVA A, CHENETTE N, LEE Y, et al. Orderpreserving symmetric encryption[M]//Advances in CryptologyEUROCRYPT 2009. Berlin Heidelberg: Springer, 2009: 224241.[15]MERKLE R C. A certified digital signature[C]//Advances in Cryptology-CRYPTO'89 Proceedings. New York: Springer, 1990: 218238.[16]AGRAWAL R, KIERNAN J, SRIKANT R, et al. Order preserving encryption for numeric data[C]//Proceedings of the 2004 ACM SIGMOD international conference on Management of data. ACM, 2004: 563574.[17]BU J, YIN M, HE D, et al. SEF: a secure, efficient, and flexible range query scheme in twotiered sensor networks[J]. International Journal of Distributed Sensor Networks, 2011(3): 876879.[18]TSOU Y T, LU C S, KUO S Y. Privacyand integritypreserving range query in wireless sensor networks[C]//Global Communications Conference (GLOBECOM), 2012 IEEE. IEEE, 2012: 328334.[19]NGUYEN T D, BUI T V, DANG V H, et al. Efficiently preserving data privacy range queries in twotiered wireless sensor networks[C]//Ubiquitous Intelligence & Computing and 9th International Conference on Autonomic & Trusted Computing (UIC/ATC), 2012 9th International Conference on. IEEE, 2012: 973978.[20]LI R, LIN Y, YI Y, et al. A privacy and integrity preserving range query protocol in twotiered sensor networks[J]. Chin J Comput, 2013, 36: 11941209.[21]YI Y, LI R, CHEN F, et al. A digital watermarking approach to secure and precise range query processing in sensor networks[C]//INFOCOM, 2013 Proceedings IEEE. IEEE, 2013: 19501958.[22]DOU Y, HUANG H, WANG R, et al. Secure range query in twotiered wireless sensor networks[J].Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50(6):12531266.[23]LIN H Y, TZENG W G. An efficient solution to the millionaires' problem based on homomorphic encryption[C]//Applied Cryptography and Network Security. Berlin Heidelberg: Springer, 2005: 456466.[24]ZHANG X, DONG L, PENG H, et al. Achieving efficient and secure range query in twotiered wireless sensor networks[C]//Proceedings of the IEEE/ACM International Symposium on Quality of Service, Hong Kong, China. IEEE, 2014: 2627.[25]BLOOM B H. Space/time tradeoffs in hash coding with allowable errors[J]. Communications of the ACM, 1970, 13(7): 422426.[26]ZHANG X, DONG L, PENG H, et al. Collusionaware privacypreserving range query in tiered wireless sensor networks[J]. Sensors, 2014, 14(12): 2390523932.[27]DONG L, ZHU J, ZHANG X, et al. SEMR: Secure and Efficient MultiDimensional Range Query Processing in Twotiered Wireless Sensor Networks[M]//WebAge Information Management. [S.l.]: Springer International Publishing, 2015: 520524. |