Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks

J Long, M Dong, K Ota, A Liu - IEEE Access, 2014 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) have been proliferating due to their wide applications in
both military and commercial use. However, one critical challenge to WSNs implementation …

Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment

V Kavitha - Peer-to-Peer Networking and Applications, 2021 - Springer
Abstract Wireless Sensor Networks (WSN) are naturally resource-constrained and have
been deployed in various applications such as home monitoring, health care monitoring and …

Trust management and reputation systems in mobile participatory sensing applications: A survey

H Mousa, SB Mokhtar, O Hasan, O Younes… - Computer Networks, 2015 - Elsevier
Participatory sensing is an emerging paradigm in which citizens everywhere voluntarily use
their computational devices to capture and share sensed data from their surrounding …

Achieving source location privacy protection in monitoring wireless sensor networks through proxy node routing

LC Mutalemwa, S Shin - Sensors, 2019 - mdpi.com
Achieving high source location privacy is critical when Wireless Sensor Networks (WSNs)
are used in sensitive applications such as in asset or battlefield monitoring. Due to the …

Hybrid online protocols for source location privacy in wireless sensor networks

M Bradbury, A Jhumka, M Leeke - Journal of Parallel and Distributed …, 2018 - Elsevier
Wireless sensor networks (WSNs) will form the building blocks of many novel applications
such as asset monitoring. These applications will have to guarantee that the location of the …

Attacker location evaluation-based fake source scheduling for source location privacy in cyber-physical systems

Z Hong, R Wang, S Ji, R Beyah - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cyber-physical systems (CPS) have been deployed in many areas and have reached
unprecedented levels of performance and efficiency. However, the security and privacy …

In-network trajectory privacy preservation

M Guo, X Jin, N Pissinou, S Zanlongo… - ACM Computing …, 2015 - dl.acm.org
Recent advances in mobile device, wireless networking, and positional technologies have
helped location-aware applications become pervasive. However, location trajectory privacy …

A source location privacy preservation scheme in WSN-assisted IoT network by randomized ring and confounding transmission

A Shukla, D Singh, M Sajwan, A Verma, A Kumar - Wireless Networks, 2022 - Springer
Wireless sensor network (WSN) based applications have become regular in our daily lives,
and their integration with the Internet of Things (IoT) makes them even more productive and …

TCSLP: A trace cost based source location privacy protection scheme in WSNs for smart cities

H Wang, G Han, C Zhu, S Chan, W Zhang - Future Generation Computer …, 2020 - Elsevier
Abstract In recent years, Wireless Sensor Networks (WSNs) have played an important role in
smart cities, which are a hot spot. More attentions have been paid to the security in smart …

Secure routing protocols for source node privacy protection in multi-hop communication wireless networks

LC Mutalemwa, S Shin - Energies, 2020 - mdpi.com
Traffic analysis attacks are common in monitoring wireless sensor networks (WSNs). In the
attacks, adversaries analyze the traffic pattern to obtain critical information such as the …