On the use of distributed relays to increase base station anonymity in wireless sensor networks

JR Ward, M Younis - MILCOM 2012-2012 IEEE Military …, 2012 - ieeexplore.ieee.org
In recent years, Wireless Sensor Networks (WSNs) have become valuable assets to both the
commercial and military communities with applications ranging from industrial control on a …

Boosting base-station anonymity in wireless sensor networks through illusive multiple-sink traffic

N Baroutis, M Younis - 2016 IEEE Global Communications …, 2016 - ieeexplore.ieee.org
In applications of Wireless Sensor Networks (WSNs), all data packets are directed towards a
single base-station (BS) over multi-hop routes. The BS is usually responsible for processing …

Clustering-based mitigation of anonymity attacks in wireless sensor networks

S Alsemairi, M Younis - 2015 IEEE Global Communications …, 2015 - ieeexplore.ieee.org
The use of wireless sensor networks (WSNs) can be advantageous in applications that
serve in hostile environments such as security surveillance and military battlefield. The …

Location privacy in WSNs: solutions, challenges, and future trends

R Rios, J Lopez, J Cuellar - Foundations of Security Analysis and Design …, 2014 - Springer
Privacy preservation is gaining popularity in Wireless Sensor Network (WSNs) due to its
adoption in everyday scenarios. There are a number of research papers in this area many of …

Designing robust routing protocols to protect base stations in wireless sensor networks

J Chen, H Zhang, X Du, B Fang… - … and Mobile Computing, 2014 - Wiley Online Library
ABSTRACT A base station is the controller and the data‐receiving center of a wireless
sensor network. Hence, a reliable and secure base station is critical to the network. Once an …

Averting in-situ adversaries in wireless sensor network using deceptive traffic

Y Ebrahimi, M Younis - 2011 IEEE Global Telecommunications …, 2011 - ieeexplore.ieee.org
Sensors in wireless sensor networks probe their surroundings and send their findings to a
nearby base-station over multi-hop routes. In a hostile application environment the network …

Effect of mobility and count of base-stations on the anonymity of wireless sensor networks

Z Ren, M Younis - 2011 7th International Wireless …, 2011 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) can be deployed to serve mission-critical applications in
hostile environments such as battlefield and territorial borders. In these setups, the WSN …

A metric for evaluating base station anonymity in acknowledgement-based wireless sensor networks

JR Ward, M Younis - 2014 IEEE Military Communications …, 2014 - ieeexplore.ieee.org
In recent years, Wireless Sensor Networks (WSNs) have become valuable assets to both the
commercial and military communities with applications ranging from industrial automation …

Novel assessment metric and countermeasures for traffic attack threats in wireless sensor networks

Y Ebrahimi, M Younis - 37th Annual IEEE Conference on Local …, 2012 - ieeexplore.ieee.org
In wireless sensor networks, all data packets are routed from the individual sensor nodes
towards an in-situ base-station (BS). Such traffic pattern makes the BS vulnerable to …

Algorithms for promoting anonymity of BS and for prolonging network lifetime of WSN

JIZ Chen, CH Lin - Peer-to-Peer Networking and Applications, 2014 - Springer
Two novel algorithms called AERO (aware of energy residue oriented) and free-AERO are
proposed in this work. They are adopted in boosting the anonymity of a mobile base station …