Optimal privacy-preserving probabilistic routing for wireless networks
Privacy-preserving routing protocols in wireless networks frequently utilize additional
artificial traffic to hide the identities of communicating source-destination pairs. Usually, the …
artificial traffic to hide the identities of communicating source-destination pairs. Usually, the …
Privacy-aware routing in sensor networks
A typical sensor network application is to monitor objects, including wildlife, vehicles and
events, in which information about an object is periodically sent back to the sink. Many times …
events, in which information about an object is periodically sent back to the sink. Many times …
An efficient anonymous communication scheme to protect the privacy of the source node location in the Internet of Things
F Li, P Ren, G Yang, Y Sun, Y Wang… - Security and …, 2021 - Wiley Online Library
Advances in machine learning (ML) in recent years have enabled a dizzying array of
applications such as data analytics, autonomous systems, and security diagnostics. As an …
applications such as data analytics, autonomous systems, and security diagnostics. As an …
Quantifying source location privacy routing performance via divergence and information loss
M Bradbury, A Jhumka - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
Source location Privacy (SLP) is an important property for security critical applications
deployed over a wireless sensor network. This property specifies that the location of the …
deployed over a wireless sensor network. This property specifies that the location of the …
Ao2p: Ad hoc on-demand position-based private routing protocol
X Wu, B Bhargava - IEEE Transactions on Mobile Computing, 2005 - ieeexplore.ieee.org
Privacy is needed in ad hoc networks. An ad hoc on-demand position-based private routing
algorithm, called AO2P, is proposed for communication anonymity. Only the position of the …
algorithm, called AO2P, is proposed for communication anonymity. Only the position of the …
Reliable privacy-preserving communications for wireless ad hoc networks
We present a phantom-receiver-based routing scheme to enhance the anonymity of each
source-destination pair (or contextual privacy) while using an adjustable amount of …
source-destination pair (or contextual privacy) while using an adjustable amount of …
Private location sharing for decentralized routing services
Data-driven methodologies offer many exciting upsides, but they also introduce new
challenges, particularly in the realm of user privacy. Specifically, the way data is collected …
challenges, particularly in the realm of user privacy. Specifically, the way data is collected …
Privacy preservation of source location using phantom nodes
Sensor networks are widely used for subject monitoring and tracking. In this modern era of
wireless technology, privacy has become one of the essential concerns of wireless sensor …
wireless technology, privacy has become one of the essential concerns of wireless sensor …
All-direction random routing for source-location privacy protecting against parasitic sensor networks
N Wang, J Zeng - Sensors, 2017 - mdpi.com
Wireless sensor networks are deployed to monitor the surrounding physical environments
and they also act as the physical environments of parasitic sensor networks, whose purpose …
and they also act as the physical environments of parasitic sensor networks, whose purpose …
Privacy preserving shortest path routing with an application to navigation
Mobile navigation is a frequently used application, especially with the increasing
proliferation of online geographical data. However, the origin and destination are often …
proliferation of online geographical data. However, the origin and destination are often …