Evolving privacy: From sensors to the Internet of Things

J Lopez, R Rios, F Bao, G Wang - Future Generation Computer Systems, 2017 - Elsevier
Abstract The Internet of Things (IoT) envisions a world covered with billions of smart,
interacting things capable of offering all sorts of services to near and remote entities. The …

KCLP: A k-means cluster-based location privacy protection scheme in WSNs for IoT

G Han, H Wang, M Guizani, S Chan… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
While enjoying the convenience brought by the Internet of Things (IoT), people also
encounter many problems with wireless sensor networks (WSNs), the foundation of IoT …

Efficient certificateless access control for industrial Internet of Things

F Li, J Hong, AA Omala - Future Generation Computer Systems, 2017 - Elsevier
Industrial wireless sensor networks (IWSNs) play an important role in monitoring the
industrial equipment and creating a highly reliable industrial system. To query of the network …

Privacy preservation for wireless sensor networks in healthcare: State of the art, and open research challenges

YNM Saleh, CC Chibelushi, AA Abdel-Hamid… - arXiv preprint arXiv …, 2020 - arxiv.org
The advent of miniature biosensors has generated numerous opportunities for deploying
wireless sensor networks in healthcare. However, an important barrier is that acceptance by …

CASLP: A confused arc-based source location privacy protection scheme in WSNs for IoT

G Han, H Wang, J Jiang, W Zhang… - IEEE Communications …, 2018 - ieeexplore.ieee.org
With the boost of IoT, WSNs have been a well-liked know-how. However, due to WSNs' open
and unmonitored nature, security vulnerabilities pose a significant problem. In this article …

Privacy-preserving protocol for sink node location in telemedicine networks

T Li, Y Liu, NN Xiong, A Liu, Z Cai, H Song - IEEE Access, 2018 - ieeexplore.ieee.org
Telemedicine is expected to play a significant role in previsioning better service and meeting
various needs of patients, healthcare providers, and policy makers by exploiting advanced …

Optimal privacy-preserving probabilistic routing for wireless networks

JY Koh, D Leong, GW Peters, I Nevat… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Privacy-preserving routing protocols in wireless networks frequently utilize additional
artificial traffic to hide the identities of communicating source-destination pairs. Usually, the …

Protecting sensitive place visits in privacy-preserving trajectory publishing

N Wang, MS Kankanhalli - Computers & Security, 2020 - Elsevier
The rise of mobile computing has generated huge amount of trajectory data. Since these
data are valuable for many people, publishing them while providing adequate individual …

Differentially private location privacy preservation in wireless sensor networks

B Chakraborty, S Verma, KP Singh - Wireless Personal Communications, 2019 - Springer
In wireless sensor networks, the privacy of an event is critical to its safety. The location
privacy of the sensor node that reports the event is imperative to the privacy of the event …

Cross-layer traffic analysis countermeasures against adaptive attackers of wireless sensor networks

JR Ward, M Younis - Wireless Networks, 2019 - Springer
Abstract In most Wireless Sensor Network (WSN) applications the sensor nodes forward
their measurements to a central base station (BS). The unique role of the BS makes it a …