[HTML][HTML] Anti-traffic analysis attack for location privacy in WSNs

B Di Ying, D Makrakis, HT Mouftah - EURASIP Journal on Wireless …, 2014 - Springer
Traditional encryption and authentication methods are not effective in preserving a sink's
location privacy from a global adversary that is monitoring the network traffic. In this paper …

Protecting the sink location privacy in wireless sensor networks

L Yao, L Kang, P Shang, G Wu - Personal and ubiquitous computing, 2013 - Springer
Wireless sensor networks (WSNs) are widely deployed to collect data in military and civilian
applications today. Due to the open nature of a WSN, it is relatively easy for an adversary to …

MimiBS: Mimicking base-station to provide location privacy protection in wireless sensor networks

YA Bangash, LF Zeng, D Feng - Journal of Computer Science and …, 2017 - Springer
In a wireless sensor network (WSN), sink node/base station (BS) gathers data from
surrounding nodes and sends them to a remote server via a gateway. BS holds important …

KCLP: A k-means cluster-based location privacy protection scheme in WSNs for IoT

G Han, H Wang, M Guizani, S Chan… - IEEE Wireless …, 2018 - ieeexplore.ieee.org
While enjoying the convenience brought by the Internet of Things (IoT), people also
encounter many problems with wireless sensor networks (WSNs), the foundation of IoT …

CPSLP: A cloud-based scheme for protecting source location privacy in wireless sensor networks using multi-sinks

G Han, X Miao, H Wang, M Guizani… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Source location privacy is a major problem in wireless sensor networks (WSNs). WSNs are
usually deployed in random areas with no protection. The source location reveals valuable …

A protocol for sink location privacy protection in wireless sensor networks

B Ying, D Makrakis, HT Mouftah - 2011 IEEE Global …, 2011 - ieeexplore.ieee.org
Due to the broadcasting nature of wireless sensor networks, it is relatively easy for an
adversary to discover the sinks' location through traffic volume analysis. Traditional …

From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks

H Chen, W Lou - International Performance Computing and …, 2010 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are often deployed in hostile environments for specific
applications from mobile objects monitoring to data collecting. By eavesdropping the sensor …

Protecting location privacy in large-scale wireless sensor networks

L Kang - 2009 IEEE International Conference on …, 2009 - ieeexplore.ieee.org
In a wireless sensor network, an adversary equipped monitoring antenna can easily
overhear packets, which may facilitate identifying the directions of packet flows and trace to …

PSSPR: a source location privacy protection scheme based on sector phantom routing in WSNs

Y Chen, J Sun, Y Yang, T Li, X Niu… - International Journal of …, 2022 - Wiley Online Library
Source location privacy (SLP) protection is an emerging research topic in wireless sensor
networks. Because the source location represents the valuable information of the target …

Concealing of the sink location in WSNs by artificially homogenizing traffic intensity

B Ying, JR Gallardo, D Makrakis… - 2011 IEEE Conference …, 2011 - ieeexplore.ieee.org
For sensor networks deployed to collect and transmit events into a sink node, sink anonymity
is a critical security property. Traditional encryption and authentication are not effective in …