Load-conscious maximization of base-station location privacy in wireless sensor networks

N Baroutis, M Younis - Computer Networks, 2017 - Elsevier
In various applications of Wireless Sensor Networks (WSNs), sensor nodes forward data
packets towards an in-situ base-station (BS) over multi-hop routes. The BS not only collects …

MimiBS: Mimicking base-station to provide location privacy protection in wireless sensor networks

YA Bangash, LF Zeng, D Feng - Journal of Computer Science and …, 2017 - Springer
In a wireless sensor network (WSN), sink node/base station (BS) gathers data from
surrounding nodes and sends them to a remote server via a gateway. BS holds important …

[PDF][PDF] Providing location anonymity in a multi-base station wireless sensor network.

R El-Badry, MF Younis - ICC, 2012 - academia.edu
Wireless Sensor Networks (WSNs) often operate in inhospitable environments to serve
mission-critical and securitysensitive applications that involve hostile adversaries. These …

Base-station location anonymity and security technique (BLAST) for wireless sensor networks

VPV Gottumukkala, V Pandit, H Li… - 2012 IEEE …, 2012 - ieeexplore.ieee.org
To ensure the uninterrupted usage in a Wireless Sensor Network (WSN), it is important to
preserve the location privacy of sensor nodes. In this paper, we propose a novel technique …

Probabilistic receiver-location privacy protection in wireless sensor networks

R Rios, J Cuellar, J Lopez - Information Sciences, 2015 - Elsevier
Wireless sensor networks (WSNs) are continually exposed to many types of attacks. Among
these, the attacks targeted at the base station are the most devastating ones since this …

From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks

H Chen, W Lou - International Performance Computing and …, 2010 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are often deployed in hostile environments for specific
applications from mobile objects monitoring to data collecting. By eavesdropping the sensor …

Protecting the sink location privacy in wireless sensor networks

L Yao, L Kang, P Shang, G Wu - Personal and ubiquitous computing, 2013 - Springer
Wireless sensor networks (WSNs) are widely deployed to collect data in military and civilian
applications today. Due to the open nature of a WSN, it is relatively easy for an adversary to …

A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks

MMEA Mahmoud, X Shen - IEEE Transactions on Parallel and …, 2011 - ieeexplore.ieee.org
In wireless sensor networks, adversaries can make use of the traffic information to locate the
monitored objects, eg, to hunt endangered animals or kill soldiers. In this paper, we first …

Protecting location privacy in large-scale wireless sensor networks

L Kang - 2009 IEEE International Conference on …, 2009 - ieeexplore.ieee.org
In a wireless sensor network, an adversary equipped monitoring antenna can easily
overhear packets, which may facilitate identifying the directions of packet flows and trace to …

A novel traffic analysis attack model and base‐station anonymity metrics for wireless sensor networks

N Baroutis, M Younis - Security and Communication Networks, 2016 - Wiley Online Library
In applications of wireless sensor networks (WSNs), all data packets are directed toward the
base‐station (BS) over multi‐hop routes. In addition to data processing, the BS can interface …