A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions

D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …

A survey on location privacy protection in wireless sensor networks

J Jiang, G Han, H Wang, M Guizani - Journal of Network and Computer …, 2019 - Elsevier
Location of sensor nodes is one of the most important and fundamental information for
Wireless Sensor Networks (WSNs), because it provides basic support for many location …

Comprehensive review on misbehavior detection for vehicular ad hoc networks

X Xu, Y Wang, P Wang - Journal of Advanced Transportation, 2022 - Wiley Online Library
Vehicular ad hoc networks (VANETs) can increase road safety and comfort. It needs strong
demand for security because the data sent in VANETs influence vehicles' behavior. Existing …

A power-efficient and social-aware relay selection method for multi-hop D2D communications

B Ying, A Nayak - IEEE Communications Letters, 2018 - ieeexplore.ieee.org
Due to the short communication range, users are selected as relays to support multi-hop
transmission for content sharing/downloading in D2D communications. In this letter, we first …

Secure and energy-efficient network topology obfuscation for software-defined WSNs

M Bin-Yahya, X Shen - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Network topology obfuscation (NTO) is generally considered as a promising proactive
mechanism to mitigate traffic analysis attacks. The main challenge is to strike a balance …

Sink location privacy protection under direction attack in wireless sensor networks

J Wang, F Wang, Z Cao, F Lin, J Wu - Wireless Networks, 2017 - Springer
Abstract Wireless Sensor Networks have been widely deployed in military and civilian
applications. Due to the nature of the sensor network, it is easy for an adversary to trace the …

TCSLP: A trace cost based source location privacy protection scheme in WSNs for smart cities

H Wang, G Han, C Zhu, S Chan, W Zhang - Future Generation Computer …, 2020 - Elsevier
Abstract In recent years, Wireless Sensor Networks (WSNs) have played an important role in
smart cities, which are a hot spot. More attentions have been paid to the security in smart …

Load-conscious maximization of base-station location privacy in wireless sensor networks

N Baroutis, M Younis - Computer Networks, 2017 - Elsevier
In various applications of Wireless Sensor Networks (WSNs), sensor nodes forward data
packets towards an in-situ base-station (BS) over multi-hop routes. The BS not only collects …

Cross-layer traffic analysis countermeasures against adaptive attackers of wireless sensor networks

JR Ward, M Younis - Wireless Networks, 2019 - Springer
Abstract In most Wireless Sensor Network (WSN) applications the sensor nodes forward
their measurements to a central base station (BS). The unique role of the BS makes it a …

Energy-aware cross-layer technique for countering traffic analysis attacks on wireless sensor network

Y Ebrahimi, M Younis - IEEE Access, 2022 - ieeexplore.ieee.org
The vital role of a base station (BS) in a wireless sensor network (WSN) has made it a
favorable target in hostile environments. Despite attempts to physically make the BS hidden …