Probabilistic receiver-location privacy protection in wireless sensor networks
Wireless sensor networks (WSNs) are continually exposed to many types of attacks. Among
these, the attacks targeted at the base station are the most devastating ones since this …
these, the attacks targeted at the base station are the most devastating ones since this …
Robust probabilistic fake packet injection for receiver-location privacy in WSN
The singular communication model in wireless sensor networks (WSNs) originate
pronounced traffic patterns that allow a local observer to deduce the location of the base …
pronounced traffic patterns that allow a local observer to deduce the location of the base …
Protecting the sink location privacy in wireless sensor networks
L Yao, L Kang, P Shang, G Wu - Personal and ubiquitous computing, 2013 - Springer
Wireless sensor networks (WSNs) are widely deployed to collect data in military and civilian
applications today. Due to the open nature of a WSN, it is relatively easy for an adversary to …
applications today. Due to the open nature of a WSN, it is relatively easy for an adversary to …
CPSLP: A cloud-based scheme for protecting source location privacy in wireless sensor networks using multi-sinks
Source location privacy is a major problem in wireless sensor networks (WSNs). WSNs are
usually deployed in random areas with no protection. The source location reveals valuable …
usually deployed in random areas with no protection. The source location reveals valuable …
A protocol for sink location privacy protection in wireless sensor networks
B Ying, D Makrakis, HT Mouftah - 2011 IEEE Global …, 2011 - ieeexplore.ieee.org
Due to the broadcasting nature of wireless sensor networks, it is relatively easy for an
adversary to discover the sinks' location through traffic volume analysis. Traditional …
adversary to discover the sinks' location through traffic volume analysis. Traditional …
STaR: design and quantitative measurement of source‐location privacy for wireless sensor networks
L Lightfoot, Y Li, J Ren - Security and Communication …, 2016 - Wiley Online Library
Wireless sensor networks (WSNs) can provide the world with a technology for real‐time
event monitoring. One of the primary concerns that hinder the successful deployment of …
event monitoring. One of the primary concerns that hinder the successful deployment of …
Base-station location anonymity and security technique (BLAST) for wireless sensor networks
To ensure the uninterrupted usage in a Wireless Sensor Network (WSN), it is important to
preserve the location privacy of sensor nodes. In this paper, we propose a novel technique …
preserve the location privacy of sensor nodes. In this paper, we propose a novel technique …
SLP-RRFPR: a source location privacy protection scheme based on random ring and limited hop fake packet routing for wireless sensor networks
In recent times, the wireless sensor network (WSN) has become an integral part of daily life.
WSN forms the necessary foundation for several important applications such as animal …
WSN forms the necessary foundation for several important applications such as animal …
A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks
MMEA Mahmoud, X Shen - IEEE Transactions on Parallel and …, 2011 - ieeexplore.ieee.org
In wireless sensor networks, adversaries can make use of the traffic information to locate the
monitored objects, eg, to hunt endangered animals or kill soldiers. In this paper, we first …
monitored objects, eg, to hunt endangered animals or kill soldiers. In this paper, we first …
A novel scheme for protecting receiver's location privacy in wireless sensor networks
Due to the open nature of a sensor network, it is relatively easy for an adversary to
eavesdrop and trace packet movement in the network in order to capture the receiver …
eavesdrop and trace packet movement in the network in order to capture the receiver …