[HTML][HTML] Anti-traffic analysis attack for location privacy in WSNs
B Di Ying, D Makrakis, HT Mouftah - EURASIP Journal on Wireless …, 2014 - Springer
Traditional encryption and authentication methods are not effective in preserving a sink's
location privacy from a global adversary that is monitoring the network traffic. In this paper …
location privacy from a global adversary that is monitoring the network traffic. In this paper …
Protecting the sink location privacy in wireless sensor networks
L Yao, L Kang, P Shang, G Wu - Personal and ubiquitous computing, 2013 - Springer
Wireless sensor networks (WSNs) are widely deployed to collect data in military and civilian
applications today. Due to the open nature of a WSN, it is relatively easy for an adversary to …
applications today. Due to the open nature of a WSN, it is relatively easy for an adversary to …
MimiBS: Mimicking base-station to provide location privacy protection in wireless sensor networks
In a wireless sensor network (WSN), sink node/base station (BS) gathers data from
surrounding nodes and sends them to a remote server via a gateway. BS holds important …
surrounding nodes and sends them to a remote server via a gateway. BS holds important …
KCLP: A k-means cluster-based location privacy protection scheme in WSNs for IoT
While enjoying the convenience brought by the Internet of Things (IoT), people also
encounter many problems with wireless sensor networks (WSNs), the foundation of IoT …
encounter many problems with wireless sensor networks (WSNs), the foundation of IoT …
CPSLP: A cloud-based scheme for protecting source location privacy in wireless sensor networks using multi-sinks
Source location privacy is a major problem in wireless sensor networks (WSNs). WSNs are
usually deployed in random areas with no protection. The source location reveals valuable …
usually deployed in random areas with no protection. The source location reveals valuable …
A protocol for sink location privacy protection in wireless sensor networks
B Ying, D Makrakis, HT Mouftah - 2011 IEEE Global …, 2011 - ieeexplore.ieee.org
Due to the broadcasting nature of wireless sensor networks, it is relatively easy for an
adversary to discover the sinks' location through traffic volume analysis. Traditional …
adversary to discover the sinks' location through traffic volume analysis. Traditional …
From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks
Wireless sensor networks (WSNs) are often deployed in hostile environments for specific
applications from mobile objects monitoring to data collecting. By eavesdropping the sensor …
applications from mobile objects monitoring to data collecting. By eavesdropping the sensor …
Protecting location privacy in large-scale wireless sensor networks
L Kang - 2009 IEEE International Conference on …, 2009 - ieeexplore.ieee.org
In a wireless sensor network, an adversary equipped monitoring antenna can easily
overhear packets, which may facilitate identifying the directions of packet flows and trace to …
overhear packets, which may facilitate identifying the directions of packet flows and trace to …
PSSPR: a source location privacy protection scheme based on sector phantom routing in WSNs
Source location privacy (SLP) protection is an emerging research topic in wireless sensor
networks. Because the source location represents the valuable information of the target …
networks. Because the source location represents the valuable information of the target …
Concealing of the sink location in WSNs by artificially homogenizing traffic intensity
B Ying, JR Gallardo, D Makrakis… - 2011 IEEE Conference …, 2011 - ieeexplore.ieee.org
For sensor networks deployed to collect and transmit events into a sink node, sink anonymity
is a critical security property. Traditional encryption and authentication are not effective in …
is a critical security property. Traditional encryption and authentication are not effective in …