From MANET to people-centric networking: Milestones and open research challenges
In this paper, we discuss the state of the art of (mobile) multi-hop ad hoc networking with the
aim to present the current status of the research activities and identify the consolidated …
aim to present the current status of the research activities and identify the consolidated …
Privacy preservation for wireless sensor networks in healthcare: State of the art, and open research challenges
The advent of miniature biosensors has generated numerous opportunities for deploying
wireless sensor networks in healthcare. However, an important barrier is that acceptance by …
wireless sensor networks in healthcare. However, an important barrier is that acceptance by …
Probabilistic receiver-location privacy protection in wireless sensor networks
Wireless sensor networks (WSNs) are continually exposed to many types of attacks. Among
these, the attacks targeted at the base station are the most devastating ones since this …
these, the attacks targeted at the base station are the most devastating ones since this …
Anti-traffic analysis attack for location privacy in WSNs
B Di Ying, D Makrakis, HT Mouftah - EURASIP Journal on Wireless …, 2014 - Springer
Traditional encryption and authentication methods are not effective in preserving a sink's
location privacy from a global adversary that is monitoring the network traffic. In this paper …
location privacy from a global adversary that is monitoring the network traffic. In this paper …
Load-conscious maximization of base-station location privacy in wireless sensor networks
N Baroutis, M Younis - Computer Networks, 2017 - Elsevier
In various applications of Wireless Sensor Networks (WSNs), sensor nodes forward data
packets towards an in-situ base-station (BS) over multi-hop routes. The BS not only collects …
packets towards an in-situ base-station (BS) over multi-hop routes. The BS not only collects …
Optimal privacy-preserving probabilistic routing for wireless networks
Privacy-preserving routing protocols in wireless networks frequently utilize additional
artificial traffic to hide the identities of communicating source-destination pairs. Usually, the …
artificial traffic to hide the identities of communicating source-destination pairs. Usually, the …
A Novel Approach for Establishing Connectivity in Partitioned Mobile Sensor Networks using Beamforming Techniques
A Mirzaei, S Zandiyan - arXiv preprint arXiv:2308.04797, 2023 - arxiv.org
Network connectivity is one of the major design issues in the context of mobile sensor
networks. Due to diverse communication patterns, some nodes lying in high-traffic zones …
networks. Due to diverse communication patterns, some nodes lying in high-traffic zones …
Using deceptive packets to increase base-station anonymity in wireless sensor network
Y Ebrahimi, M Younis - 2011 7th International Wireless …, 2011 - ieeexplore.ieee.org
In wireless sensor networks, nodes probe ambient conditions in their surrounding and report
back to the base-station via multi-hop routing. In a hostile environment the network may be …
back to the base-station via multi-hop routing. In a hostile environment the network may be …
An anonymous and authenticated V2I communication with a simplified user revocation and re-registration strategy
Abstract Vehicle-to-Infrastructure (V2I) communication is the key requirement in various
applications of Vehicular Ad-hoc Network (VANET). However, due to the use of unguided …
applications of Vehicular Ad-hoc Network (VANET). However, due to the use of unguided …
Analysis of location privacy solutions in wireless sensor networks
Extensive work has been done on the protection of wireless sensor networks (WSNs) from
the hardware to the application layer. However, only recently, the privacy preservation …
the hardware to the application layer. However, only recently, the privacy preservation …