From MANET to people-centric networking: Milestones and open research challenges

M Conti, C Boldrini, SS Kanhere, E Mingozzi… - Computer …, 2015 - Elsevier
In this paper, we discuss the state of the art of (mobile) multi-hop ad hoc networking with the
aim to present the current status of the research activities and identify the consolidated …

Privacy preservation for wireless sensor networks in healthcare: State of the art, and open research challenges

YNM Saleh, CC Chibelushi, AA Abdel-Hamid… - arXiv preprint arXiv …, 2020 - arxiv.org
The advent of miniature biosensors has generated numerous opportunities for deploying
wireless sensor networks in healthcare. However, an important barrier is that acceptance by …

Probabilistic receiver-location privacy protection in wireless sensor networks

R Rios, J Cuellar, J Lopez - Information Sciences, 2015 - Elsevier
Wireless sensor networks (WSNs) are continually exposed to many types of attacks. Among
these, the attacks targeted at the base station are the most devastating ones since this …

Anti-traffic analysis attack for location privacy in WSNs

B Di Ying, D Makrakis, HT Mouftah - EURASIP Journal on Wireless …, 2014 - Springer
Traditional encryption and authentication methods are not effective in preserving a sink's
location privacy from a global adversary that is monitoring the network traffic. In this paper …

Load-conscious maximization of base-station location privacy in wireless sensor networks

N Baroutis, M Younis - Computer Networks, 2017 - Elsevier
In various applications of Wireless Sensor Networks (WSNs), sensor nodes forward data
packets towards an in-situ base-station (BS) over multi-hop routes. The BS not only collects …

Optimal privacy-preserving probabilistic routing for wireless networks

JY Koh, D Leong, GW Peters, I Nevat… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Privacy-preserving routing protocols in wireless networks frequently utilize additional
artificial traffic to hide the identities of communicating source-destination pairs. Usually, the …

A Novel Approach for Establishing Connectivity in Partitioned Mobile Sensor Networks using Beamforming Techniques

A Mirzaei, S Zandiyan - arXiv preprint arXiv:2308.04797, 2023 - arxiv.org
Network connectivity is one of the major design issues in the context of mobile sensor
networks. Due to diverse communication patterns, some nodes lying in high-traffic zones …

Using deceptive packets to increase base-station anonymity in wireless sensor network

Y Ebrahimi, M Younis - 2011 7th International Wireless …, 2011 - ieeexplore.ieee.org
In wireless sensor networks, nodes probe ambient conditions in their surrounding and report
back to the base-station via multi-hop routing. In a hostile environment the network may be …

An anonymous and authenticated V2I communication with a simplified user revocation and re-registration strategy

P Kumar, H Om - The Journal of Supercomputing, 2023 - Springer
Abstract Vehicle-to-Infrastructure (V2I) communication is the key requirement in various
applications of Vehicular Ad-hoc Network (VANET). However, due to the use of unguided …

Analysis of location privacy solutions in wireless sensor networks

R Rios, J Lopez - Iet Communications, 2011 - IET
Extensive work has been done on the protection of wireless sensor networks (WSNs) from
the hardware to the application layer. However, only recently, the privacy preservation …