A novel traffic analysis attack model and base‐station anonymity metrics for wireless sensor networks

N Baroutis, M Younis - Security and Communication Networks, 2016 - Wiley Online Library
In applications of wireless sensor networks (WSNs), all data packets are directed toward the
base‐station (BS) over multi‐hop routes. In addition to data processing, the BS can interface …

Increasing base-station anonymity through illusive void formation

M Boulaiche, M Younis - International Journal of …, 2020 - inderscienceonline.com
A wireless sensor network consists of a set of nodes connected by wireless links. These
nodes probe their surroundings and send their data over multi-hop routes to a base-station …

Adaptive packet-combining to counter traffic analysis in wireless sensor networks

S Alsemairi, M Younis - 2015 International Wireless …, 2015 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) have become an attractive choice for many applications
that serve in hostile setup. The operation model of a WSN makes it possible for an adversary …

A cross-layer defense scheme for countering traffic analysis attacks in Wireless Sensor Networks

JR Ward, M Younis - MILCOM 2015-2015 IEEE Military …, 2015 - ieeexplore.ieee.org
In most Wireless Sensor Network (WSN) applications the sensors forward their readings to a
central sink or base station (BS). The unique role of the BS makes it a natural target for an …

Traffic analysis through spatial and temporal correlation: threat and countermeasure

Y Ebrahimi, M Younis - IEEE Access, 2021 - ieeexplore.ieee.org
The base station (BS) in a Wireless Sensor Network (WSN) plays the role of a data sink, a
point of contact with the upper hierarchy, and an in-situ command and control unit. Such an …

RETRACTED ARTICLE: Privacy-preserving routing using jointly established protocol in IoT network environment

FZ Zhu, ZY Jiang - EURASIP Journal on Wireless Communications and …, 2023 - Springer
In this paper, network energy assesses the capacity of a node to convey messages to others.
In most cases, network energy is created when two nodes interact with one another. If a …

[图书][B] Location privacy in wireless sensor networks

R Rios, J Lopez, J Cuellar - 2016 - taylorfrancis.com
Today all kinds of ubiquitous systems, led by wireless sensor networks, can be seen as an
unprecedented privacy risk given their ability to collect information on quantities and …

Sink location protection protocols based on packet sending rate adjustment

J Chen, Z Lin, Y Liu, Y Hu, X Du - International Journal of …, 2016 - journals.sagepub.com
Sink location protection is critical to the viability of sensor networks as the central point of
failure. Most existing work related to sink location protection focuses on local traffic analysis …

An energy-efficient cross-layer routing approach for wireless sensor networks using distributed beamforming

JR Ward, M Younis - 2016 IEEE Global Communications …, 2016 - ieeexplore.ieee.org
Wireless sensor networks are valuable assets to both the commercial and military
communities with applications ranging from industrial control on a factory floor to …

Mpbsd: a moving target defense approach for base station security in wireless sensor networks

T Chin, K Xiong - Wireless Algorithms, Systems, and Applications: 11th …, 2016 - Springer
This paper addresses one major concern on how to secure the location information of a
base station in a compromised Wireless Sensor Network (WSN). In this concern, disrupting …