Evolving privacy: From sensors to the Internet of Things
Abstract The Internet of Things (IoT) envisions a world covered with billions of smart,
interacting things capable of offering all sorts of services to near and remote entities. The …
interacting things capable of offering all sorts of services to near and remote entities. The …
KCLP: A k-means cluster-based location privacy protection scheme in WSNs for IoT
While enjoying the convenience brought by the Internet of Things (IoT), people also
encounter many problems with wireless sensor networks (WSNs), the foundation of IoT …
encounter many problems with wireless sensor networks (WSNs), the foundation of IoT …
Efficient certificateless access control for industrial Internet of Things
Industrial wireless sensor networks (IWSNs) play an important role in monitoring the
industrial equipment and creating a highly reliable industrial system. To query of the network …
industrial equipment and creating a highly reliable industrial system. To query of the network …
Privacy preservation for wireless sensor networks in healthcare: State of the art, and open research challenges
The advent of miniature biosensors has generated numerous opportunities for deploying
wireless sensor networks in healthcare. However, an important barrier is that acceptance by …
wireless sensor networks in healthcare. However, an important barrier is that acceptance by …
CASLP: A confused arc-based source location privacy protection scheme in WSNs for IoT
With the boost of IoT, WSNs have been a well-liked know-how. However, due to WSNs' open
and unmonitored nature, security vulnerabilities pose a significant problem. In this article …
and unmonitored nature, security vulnerabilities pose a significant problem. In this article …
Privacy-preserving protocol for sink node location in telemedicine networks
Telemedicine is expected to play a significant role in previsioning better service and meeting
various needs of patients, healthcare providers, and policy makers by exploiting advanced …
various needs of patients, healthcare providers, and policy makers by exploiting advanced …
Optimal privacy-preserving probabilistic routing for wireless networks
Privacy-preserving routing protocols in wireless networks frequently utilize additional
artificial traffic to hide the identities of communicating source-destination pairs. Usually, the …
artificial traffic to hide the identities of communicating source-destination pairs. Usually, the …
Protecting sensitive place visits in privacy-preserving trajectory publishing
N Wang, MS Kankanhalli - Computers & Security, 2020 - Elsevier
The rise of mobile computing has generated huge amount of trajectory data. Since these
data are valuable for many people, publishing them while providing adequate individual …
data are valuable for many people, publishing them while providing adequate individual …
Differentially private location privacy preservation in wireless sensor networks
B Chakraborty, S Verma, KP Singh - Wireless Personal Communications, 2019 - Springer
In wireless sensor networks, the privacy of an event is critical to its safety. The location
privacy of the sensor node that reports the event is imperative to the privacy of the event …
privacy of the sensor node that reports the event is imperative to the privacy of the event …
Cross-layer traffic analysis countermeasures against adaptive attackers of wireless sensor networks
JR Ward, M Younis - Wireless Networks, 2019 - Springer
Abstract In most Wireless Sensor Network (WSN) applications the sensor nodes forward
their measurements to a central base station (BS). The unique role of the BS makes it a …
their measurements to a central base station (BS). The unique role of the BS makes it a …