Probabilistic receiver-location privacy protection in wireless sensor networks

R Rios, J Cuellar, J Lopez - Information Sciences, 2015 - Elsevier
Wireless sensor networks (WSNs) are continually exposed to many types of attacks. Among
these, the attacks targeted at the base station are the most devastating ones since this …

Robust probabilistic fake packet injection for receiver-location privacy in WSN

R Rios, J Cuellar, J Lopez - … 2012: 17th European Symposium on Research …, 2012 - Springer
The singular communication model in wireless sensor networks (WSNs) originate
pronounced traffic patterns that allow a local observer to deduce the location of the base …

Protecting the sink location privacy in wireless sensor networks

L Yao, L Kang, P Shang, G Wu - Personal and ubiquitous computing, 2013 - Springer
Wireless sensor networks (WSNs) are widely deployed to collect data in military and civilian
applications today. Due to the open nature of a WSN, it is relatively easy for an adversary to …

CPSLP: A cloud-based scheme for protecting source location privacy in wireless sensor networks using multi-sinks

G Han, X Miao, H Wang, M Guizani… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Source location privacy is a major problem in wireless sensor networks (WSNs). WSNs are
usually deployed in random areas with no protection. The source location reveals valuable …

A protocol for sink location privacy protection in wireless sensor networks

B Ying, D Makrakis, HT Mouftah - 2011 IEEE Global …, 2011 - ieeexplore.ieee.org
Due to the broadcasting nature of wireless sensor networks, it is relatively easy for an
adversary to discover the sinks' location through traffic volume analysis. Traditional …

STaR: design and quantitative measurement of source‐location privacy for wireless sensor networks

L Lightfoot, Y Li, J Ren - Security and Communication …, 2016 - Wiley Online Library
Wireless sensor networks (WSNs) can provide the world with a technology for real‐time
event monitoring. One of the primary concerns that hinder the successful deployment of …

Base-station location anonymity and security technique (BLAST) for wireless sensor networks

VPV Gottumukkala, V Pandit, H Li… - 2012 IEEE …, 2012 - ieeexplore.ieee.org
To ensure the uninterrupted usage in a Wireless Sensor Network (WSN), it is important to
preserve the location privacy of sensor nodes. In this paper, we propose a novel technique …

SLP-RRFPR: a source location privacy protection scheme based on random ring and limited hop fake packet routing for wireless sensor networks

A Shukla, D Singh, M Sajwan, M Kumar… - Multimedia Tools and …, 2022 - Springer
In recent times, the wireless sensor network (WSN) has become an integral part of daily life.
WSN forms the necessary foundation for several important applications such as animal …

A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks

MMEA Mahmoud, X Shen - IEEE Transactions on Parallel and …, 2011 - ieeexplore.ieee.org
In wireless sensor networks, adversaries can make use of the traffic information to locate the
monitored objects, eg, to hunt endangered animals or kill soldiers. In this paper, we first …

A novel scheme for protecting receiver's location privacy in wireless sensor networks

Y Jian, S Chen, Z Zhang… - IEEE Transactions on …, 2008 - ieeexplore.ieee.org
Due to the open nature of a sensor network, it is relatively easy for an adversary to
eavesdrop and trace packet movement in the network in order to capture the receiver …