Load-conscious maximization of base-station location privacy in wireless sensor networks
N Baroutis, M Younis - Computer Networks, 2017 - Elsevier
In various applications of Wireless Sensor Networks (WSNs), sensor nodes forward data
packets towards an in-situ base-station (BS) over multi-hop routes. The BS not only collects …
packets towards an in-situ base-station (BS) over multi-hop routes. The BS not only collects …
MimiBS: Mimicking base-station to provide location privacy protection in wireless sensor networks
In a wireless sensor network (WSN), sink node/base station (BS) gathers data from
surrounding nodes and sends them to a remote server via a gateway. BS holds important …
surrounding nodes and sends them to a remote server via a gateway. BS holds important …
[PDF][PDF] Providing location anonymity in a multi-base station wireless sensor network.
R El-Badry, MF Younis - ICC, 2012 - academia.edu
Wireless Sensor Networks (WSNs) often operate in inhospitable environments to serve
mission-critical and securitysensitive applications that involve hostile adversaries. These …
mission-critical and securitysensitive applications that involve hostile adversaries. These …
Base-station location anonymity and security technique (BLAST) for wireless sensor networks
To ensure the uninterrupted usage in a Wireless Sensor Network (WSN), it is important to
preserve the location privacy of sensor nodes. In this paper, we propose a novel technique …
preserve the location privacy of sensor nodes. In this paper, we propose a novel technique …
Probabilistic receiver-location privacy protection in wireless sensor networks
Wireless sensor networks (WSNs) are continually exposed to many types of attacks. Among
these, the attacks targeted at the base station are the most devastating ones since this …
these, the attacks targeted at the base station are the most devastating ones since this …
From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks
Wireless sensor networks (WSNs) are often deployed in hostile environments for specific
applications from mobile objects monitoring to data collecting. By eavesdropping the sensor …
applications from mobile objects monitoring to data collecting. By eavesdropping the sensor …
Protecting the sink location privacy in wireless sensor networks
L Yao, L Kang, P Shang, G Wu - Personal and ubiquitous computing, 2013 - Springer
Wireless sensor networks (WSNs) are widely deployed to collect data in military and civilian
applications today. Due to the open nature of a WSN, it is relatively easy for an adversary to …
applications today. Due to the open nature of a WSN, it is relatively easy for an adversary to …
A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks
MMEA Mahmoud, X Shen - IEEE Transactions on Parallel and …, 2011 - ieeexplore.ieee.org
In wireless sensor networks, adversaries can make use of the traffic information to locate the
monitored objects, eg, to hunt endangered animals or kill soldiers. In this paper, we first …
monitored objects, eg, to hunt endangered animals or kill soldiers. In this paper, we first …
Protecting location privacy in large-scale wireless sensor networks
L Kang - 2009 IEEE International Conference on …, 2009 - ieeexplore.ieee.org
In a wireless sensor network, an adversary equipped monitoring antenna can easily
overhear packets, which may facilitate identifying the directions of packet flows and trace to …
overhear packets, which may facilitate identifying the directions of packet flows and trace to …
A novel traffic analysis attack model and base‐station anonymity metrics for wireless sensor networks
N Baroutis, M Younis - Security and Communication Networks, 2016 - Wiley Online Library
In applications of wireless sensor networks (WSNs), all data packets are directed toward the
base‐station (BS) over multi‐hop routes. In addition to data processing, the BS can interface …
base‐station (BS) over multi‐hop routes. In addition to data processing, the BS can interface …