Hybrid online protocols for source location privacy in wireless sensor networks

M Bradbury, A Jhumka, M Leeke - Journal of Parallel and Distributed …, 2018 - Elsevier
Wireless sensor networks (WSNs) will form the building blocks of many novel applications
such as asset monitoring. These applications will have to guarantee that the location of the …

Overview of the security and privacy issues in smart grids

KG Boroojeni, MH Amini, SS Iyengar… - Smart grids: security and …, 2017 - Springer
In recent years, there is an increasing trend in the power systems from a centralized fossil
fuel-based grid toward a distributed green-based network. This requirement compels a new …

Attacker location evaluation-based fake source scheduling for source location privacy in cyber-physical systems

Z Hong, R Wang, S Ji, R Beyah - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cyber-physical systems (CPS) have been deployed in many areas and have reached
unprecedented levels of performance and efficiency. However, the security and privacy …

An enhanced source location privacy based on data dissemination in wireless sensor networks (DeLP)

N Jan, AH Al-Bayatti, N Alalwan, AI Alzahrani - Sensors, 2019 - mdpi.com
Wireless Sensor Network is a network of large number of nodes with limited power and
computational capabilities. It has the potential of event monitoring in unattended locations …

A dynamic fake source algorithm for source location privacy in wireless sensor networks

M Bradbury, M Leeke, A Jhumka - 2015 IEEE Trustcom …, 2015 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are commonly used in asset monitoring applications,
where it is often desirable for the location of the asset being monitored to be kept private …

Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks

J Kirton, M Bradbury, A Jhumka - Computer Networks, 2018 - Elsevier
Abstract Source Location Privacy (SLP) is becoming important for wireless sensor networks
where the source of messages is kept hidden from an attacker. In this paper, we conjecture …

Hiding the source based on limited flooding for sensor networks

J Chen, Z Lin, Y Hu, B Wang - Sensors, 2015 - mdpi.com
Wireless sensor networks are widely used to monitor valuable objects such as rare animals
or armies. Once an object is detected, the source, ie, the sensor nearest to the object …

A Performance Efficient Quadrant-Based Scheme for Multiple Assets Location Preservation in Wireless Sensor Networks

Nisha, S Suresh - IETE Journal of Research, 2024 - Taylor & Francis
The usefulness of wireless sensor networks has grown throughout numerous areas, many of
which demand constant monitoring of the event of interest by the sensor nodes. The wireless …

[PDF][PDF] 基于攻击感知的能量高效源位置隐私保护算法

周倩, 秦小麟, 丁有伟 - Journal on Communication/Tongxin …, 2018 - infocomm-journal.com
提出了一种静默池机制方法(SPA, silent-pool approach), 当传感器节点感知到附近移动攻击者
的存在, 通过控制节点的转发状态从而阻止和减少攻击者收到有效数据分组. 在此基础上 …

Topology2Vec: topology representation learning for data center networking

Z Xie, L Hu, K Zhao, F Wang, J Pang - IEEE Access, 2018 - ieeexplore.ieee.org
The use of machine learning (ML) algorithms to conduct prediction or analysis tasks in a
data center networking (DCN) environment is gaining increasing attention today. Recent …