Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks
Wireless sensor networks (WSNs) have been proliferating due to their wide applications in
both military and commercial use. However, one critical challenge to WSNs implementation …
both military and commercial use. However, one critical challenge to WSNs implementation …
Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment
V Kavitha - Peer-to-Peer Networking and Applications, 2021 - Springer
Abstract Wireless Sensor Networks (WSN) are naturally resource-constrained and have
been deployed in various applications such as home monitoring, health care monitoring and …
been deployed in various applications such as home monitoring, health care monitoring and …
Trust management and reputation systems in mobile participatory sensing applications: A survey
Participatory sensing is an emerging paradigm in which citizens everywhere voluntarily use
their computational devices to capture and share sensed data from their surrounding …
their computational devices to capture and share sensed data from their surrounding …
Achieving source location privacy protection in monitoring wireless sensor networks through proxy node routing
LC Mutalemwa, S Shin - Sensors, 2019 - mdpi.com
Achieving high source location privacy is critical when Wireless Sensor Networks (WSNs)
are used in sensitive applications such as in asset or battlefield monitoring. Due to the …
are used in sensitive applications such as in asset or battlefield monitoring. Due to the …
Hybrid online protocols for source location privacy in wireless sensor networks
M Bradbury, A Jhumka, M Leeke - Journal of Parallel and Distributed …, 2018 - Elsevier
Wireless sensor networks (WSNs) will form the building blocks of many novel applications
such as asset monitoring. These applications will have to guarantee that the location of the …
such as asset monitoring. These applications will have to guarantee that the location of the …
Attacker location evaluation-based fake source scheduling for source location privacy in cyber-physical systems
Cyber-physical systems (CPS) have been deployed in many areas and have reached
unprecedented levels of performance and efficiency. However, the security and privacy …
unprecedented levels of performance and efficiency. However, the security and privacy …
In-network trajectory privacy preservation
M Guo, X Jin, N Pissinou, S Zanlongo… - ACM Computing …, 2015 - dl.acm.org
Recent advances in mobile device, wireless networking, and positional technologies have
helped location-aware applications become pervasive. However, location trajectory privacy …
helped location-aware applications become pervasive. However, location trajectory privacy …
A source location privacy preservation scheme in WSN-assisted IoT network by randomized ring and confounding transmission
Wireless sensor network (WSN) based applications have become regular in our daily lives,
and their integration with the Internet of Things (IoT) makes them even more productive and …
and their integration with the Internet of Things (IoT) makes them even more productive and …
TCSLP: A trace cost based source location privacy protection scheme in WSNs for smart cities
Abstract In recent years, Wireless Sensor Networks (WSNs) have played an important role in
smart cities, which are a hot spot. More attentions have been paid to the security in smart …
smart cities, which are a hot spot. More attentions have been paid to the security in smart …
Secure routing protocols for source node privacy protection in multi-hop communication wireless networks
LC Mutalemwa, S Shin - Energies, 2020 - mdpi.com
Traffic analysis attacks are common in monitoring wireless sensor networks (WSNs). In the
attacks, adversaries analyze the traffic pattern to obtain critical information such as the …
attacks, adversaries analyze the traffic pattern to obtain critical information such as the …