%PDF-1.5 % 1 0 obj << /S /GoTo /D (section.1) >> endobj 4 0 obj (1 Introduction) endobj 5 0 obj << /S /GoTo /D (section.2) >> endobj 8 0 obj (2 Related Work) endobj 9 0 obj << /S /GoTo /D (section.3) >> endobj 12 0 obj (3 Background and Motivation) endobj 13 0 obj << /S /GoTo /D (subsection.3.1) >> endobj 16 0 obj (3.1 Network Model) endobj 17 0 obj << /S /GoTo /D (subsection.3.2) >> endobj 20 0 obj (3.2 Secure In-network Aggregation) endobj 21 0 obj << /S /GoTo /D (subsection.3.3) >> endobj 24 0 obj (3.3 Challenges and Our Solution) endobj 25 0 obj << /S /GoTo /D (section.4) >> endobj 28 0 obj (4 Preliminaries) endobj 29 0 obj << /S /GoTo /D (subsection.4.1) >> endobj 32 0 obj (4.1 Bilinear Pairing) endobj 33 0 obj << /S /GoTo /D (subsection.4.2) >> endobj 36 0 obj (4.2 Proxy Re-encryption) endobj 37 0 obj << /S /GoTo /D (section.5) >> endobj 40 0 obj (5 Proposed Solutions) endobj 41 0 obj << /S /GoTo /D (subsection.5.1) >> endobj 44 0 obj (5.1 Light-weight Dynamic Grouping) endobj 45 0 obj << /S /GoTo /D (subsection.5.2) >> endobj 48 0 obj (5.2 Revised in-network aggregation) endobj 49 0 obj << /S /GoTo /D (subsubsection*.3) >> endobj 52 0 obj (System Initialization) endobj 53 0 obj << /S /GoTo /D (subsubsection*.4) >> endobj 56 0 obj (Leaf Node Aggregation) endobj 57 0 obj << /S /GoTo /D (subsubsection*.5) >> endobj 60 0 obj (Intermediate Node Aggregation) endobj 61 0 obj << /S /GoTo /D (subsubsection*.6) >> endobj 64 0 obj (Final Result Reading and Verification) endobj 65 0 obj << /S /GoTo /D (subsection.5.3) >> endobj 68 0 obj (5.3 Group-based anomaly detection) endobj 69 0 obj << /S /GoTo /D (subsubsection*.7) >> endobj 72 0 obj (Data collected at the verifier) endobj 73 0 obj << /S /GoTo /D (subsubsection*.8) >> endobj 76 0 obj (Data Re-encryption) endobj 77 0 obj << /S /GoTo /D (subsubsection*.9) >> endobj 80 0 obj (Group-based anomaly detection) endobj 81 0 obj << /S /GoTo /D (section.6) >> endobj 84 0 obj (6 Security Analysis) endobj 85 0 obj << /S /GoTo /D (section.7) >> endobj 88 0 obj (7 Performance Evaluation) endobj 89 0 obj << /S /GoTo /D (subsection.7.1) >> endobj 92 0 obj (7.1 Grouping Result) endobj 93 0 obj << /S /GoTo /D (subsection.7.2) >> endobj 96 0 obj (7.2 Computation Overhead) endobj 97 0 obj << /S /GoTo /D (subsection.7.3) >> endobj 100 0 obj (7.3 Storage Overhead) endobj 101 0 obj << /S /GoTo /D (subsection.7.4) >> endobj 104 0 obj (7.4 Communication Overhead) endobj 105 0 obj << /S /GoTo /D (subsection.7.5) >> endobj 108 0 obj (7.5 Anomaly Detector Performance) endobj 109 0 obj << /S /GoTo /D (section.8) >> endobj 112 0 obj (8 Conclusion) endobj 113 0 obj << /S /GoTo /D [114 0 R /Fit] >> endobj 126 0 obj << /Length 3966 /Filter /FlateDecode >> stream xڝr6]_1oTi(/ulq
/6yMw(RR1IUcg/<7Bk"([NUuNELQ髗/'{y}Mo
]MQ_)a{9a֛(N]m]gZnu!Q
a?n֠o_pibvX缫nΔzM=mGGyW}/r3?䍆CO|
2'zoib.=®2y/6|3r+;16lYt^q @ylsgQw*qU$#p6rާߗ3i oJn*@qtwM4͍_iítOw|Zˌr\Eh{a$_މ.@6PX?d/]Ӹ0 Vq'1MK(Sfl)Q^=Ua&V$s#Y9dpGu6ͮ9W: @'_>^8ZܹfߋCs.E4(
'CAj_Փ"B+.c7NC(#,I!OaJf*tׁ
oQY8 QMjnΫ۱![C0(D6Xq]rMØY\ե5˳mxiGSaF#եYQrƞ6QG 5g
Ƅ`l`v[`Dʹ;(1+26:ˌiVA%Ch3mK{o|)6yێY,wa 6K
xȩQ
`^hFD~kn<45[/ĺ"]dUF.yݒ@@E tG'CL{2k*NvE~~]UH"ұzUPwUP zn**vT{u~dBpqvE$6+w8xR{hAs@50fQRD