Evolving privacy: From sensors to the Internet of Things

J Lopez, R Rios, F Bao, G Wang - Future Generation Computer Systems, 2017 - Elsevier
Abstract The Internet of Things (IoT) envisions a world covered with billions of smart,
interacting things capable of offering all sorts of services to near and remote entities. The …

An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing

J Long, A Liu, M Dong, Z Li - Journal of parallel and Distributed computing, 2015 - Elsevier
Sink location privacy is one of the major issues in Wireless Sensor Networks (WSNs) where
adversaries may locate the sink by observing the destination of packets, directing and …

Political violence and volatility in international tourist arrivals: The case of Sri Lanka

S Fernando, JS Bandara, S Liyanaarachch… - Tourism …, 2013 - ingentaconnect.com
In recent years, a growing body of literature has emerged exploring the link between
dramatic fluctuations in tourist arrivals to particular destinations and events such as political …

Probabilistic receiver-location privacy protection in wireless sensor networks

R Rios, J Cuellar, J Lopez - Information Sciences, 2015 - Elsevier
Wireless sensor networks (WSNs) are continually exposed to many types of attacks. Among
these, the attacks targeted at the base station are the most devastating ones since this …

Preserving smart sink-location privacy with delay guaranteed routing scheme for WSNs

A Liu, X Liu, Z Tang, LT Yang, Z Shao - ACM Transactions on Embedded …, 2017 - dl.acm.org
A Semi Random Circle routing for mobile Sink joint Ray Routing for data (SRCRR) scheme
is proposed for preserving sink-location privacy with a delay guaranteed. In the SRCRR …

MimiBS: Mimicking base-station to provide location privacy protection in wireless sensor networks

YA Bangash, LF Zeng, D Feng - Journal of Computer Science and …, 2017 - Springer
In a wireless sensor network (WSN), sink node/base station (BS) gathers data from
surrounding nodes and sends them to a remote server via a gateway. BS holds important …

Cross-layer traffic analysis countermeasures against adaptive attackers of wireless sensor networks

JR Ward, M Younis - Wireless Networks, 2019 - Springer
Abstract In most Wireless Sensor Network (WSN) applications the sensor nodes forward
their measurements to a central base station (BS). The unique role of the BS makes it a …

Counterfeit clones: a novel technique for source and sink location privacy in wireless sensor networks

SA Al-Ahmadi - IEEE Access, 2022 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) are an essential part of the Internet of Things (IoT). In
WSNs, sensors are randomly deployed in harsh environments for monitoring purposes. In …

Secure and reliable surveillance over cognitive radio sensor networks in smart grid

US Premarathne, I Khalil, M Atiquzzaman - Pervasive and Mobile …, 2015 - Elsevier
In view of recent attacks on smart grid surveillance is of vital importance to enforce
surveillance based disaster recovery management operations to ensure seamless energy …

An attack tree based risk assessment for location privacy in wireless sensor networks

R Jiang, J Luo, X Wang - 2012 8th International Conference on …, 2012 - ieeexplore.ieee.org
The challenging nature of insecure wireless channels and constrained resources make
protection for wireless sensor networks (WSNs) an especially essential problem. The …