Optimal privacy-preserving probabilistic routing for wireless networks

JY Koh, D Leong, GW Peters, I Nevat… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Privacy-preserving routing protocols in wireless networks frequently utilize additional
artificial traffic to hide the identities of communicating source-destination pairs. Usually, the …

Privacy-aware routing in sensor networks

H Wang, B Sheng, Q Li - Computer Networks, 2009 - Elsevier
A typical sensor network application is to monitor objects, including wildlife, vehicles and
events, in which information about an object is periodically sent back to the sink. Many times …

An efficient anonymous communication scheme to protect the privacy of the source node location in the Internet of Things

F Li, P Ren, G Yang, Y Sun, Y Wang… - Security and …, 2021 - Wiley Online Library
Advances in machine learning (ML) in recent years have enabled a dizzying array of
applications such as data analytics, autonomous systems, and security diagnostics. As an …

Quantifying source location privacy routing performance via divergence and information loss

M Bradbury, A Jhumka - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
Source location Privacy (SLP) is an important property for security critical applications
deployed over a wireless sensor network. This property specifies that the location of the …

Ao2p: Ad hoc on-demand position-based private routing protocol

X Wu, B Bhargava - IEEE Transactions on Mobile Computing, 2005 - ieeexplore.ieee.org
Privacy is needed in ad hoc networks. An ad hoc on-demand position-based private routing
algorithm, called AO2P, is proposed for communication anonymity. Only the position of the …

Reliable privacy-preserving communications for wireless ad hoc networks

JY Koh, JCM Teo, D Leong… - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
We present a phantom-receiver-based routing scheme to enhance the anonymity of each
source-destination pair (or contextual privacy) while using an adjustable amount of …

Private location sharing for decentralized routing services

M Tsao, K Yang, K Gopalakrishnan… - 2022 IEEE 25th …, 2022 - ieeexplore.ieee.org
Data-driven methodologies offer many exciting upsides, but they also introduce new
challenges, particularly in the realm of user privacy. Specifically, the way data is collected …

Privacy preservation of source location using phantom nodes

S Gupta, P Kumar, JP Singh, MP Singh - Information Technology: New …, 2016 - Springer
Sensor networks are widely used for subject monitoring and tracking. In this modern era of
wireless technology, privacy has become one of the essential concerns of wireless sensor …

All-direction random routing for source-location privacy protecting against parasitic sensor networks

N Wang, J Zeng - Sensors, 2017 - mdpi.com
Wireless sensor networks are deployed to monitor the surrounding physical environments
and they also act as the physical environments of parasitic sensor networks, whose purpose …

Privacy preserving shortest path routing with an application to navigation

Y Xi, L Schwiebert, W Shi - Pervasive and Mobile Computing, 2014 - Elsevier
Mobile navigation is a frequently used application, especially with the increasing
proliferation of online geographical data. However, the origin and destination are often …