Towards Resilient Machine Learning Models: Addressing Adversarial Attacks in Wireless Sensor Network

MA Shihab, HA Marhoon, SR Ahmed… - Journal of Robotics …, 2024 - journal.umy.ac.id
Adversarial attacks represent a substantial threat to the security and reliability of machine
learning models employed in wireless sensor networks (WSNs). This study tries to solve this …

Analysis of Context-Oriented Source Location Privacy Preservation Techniques for Wireless Sensor Networks

N Singh, S Suresh - SN Computer Science, 2023 - Springer
The rapidly advancing Internet of things has eventually led to both dependency and
efficiency in almost all walks of life. However, with every benefit, there comes a threat to the …

Source location privacy preservation in IoT-enabled event-driven WSNs

N Sharma, R Bhatt - International Journal of Pervasive Computing and …, 2023 - emerald.com
Purpose Privacy preservation is a significant concern in Internet of Things (IoT)-enabled
event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven …

A novel deception-based scheme to secure the location information for iobt entities

B Alkanjr, I Mahgoub - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Battlefield Things (IoBT) is a subdomain of the Internet of Things (IoT) that
applies to a battlefield. Due to the limited communication infrastructure, the entities in the …

Gray wolf optimizer with communication strategy based on DV-Hop for nodes location of wireless sensor networks

D Yu, T Yuan, H Qing, W Xie, P Zhu - IEEE Access, 2024 - ieeexplore.ieee.org
Node localization remains a pivotal research challenge in Wireless Sensor Networks (WSN).
The DV-Hop method, which estimates the positions of unknown nodes using anchor nodes …

A Total Randomized SLP-Preserving Technique with Improved Privacy and Lifetime in WSNs for IoT and the Impact of Radio Range on SLP

F Mukamanzi, R Manjula, R Datta, T Koduru… - Sensors, 2023 - mdpi.com
Enhanced source location privacy and prolonged network lifetime are imperative for WSNs—
the skin of IoT. To address these issues, a novel technique named source location privacy …

Multi-AUV Collaboration Assisted Location Privacy Protection Scheme in Unknown Marine Environments

H Wang, G Han, D Tang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
With the increase in the status of the ocean, the development of ocean resources is a
priority, as is ocean security. Ocean security contains several aspects, such as equipment …

A Source Location Privacy Preservation Method Using Mixed Fake Sources and Phantoms

Z Hong, W Chen, T Li, J Su - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
Industrial cyber-physical systems (ICPS) have significantly improved production efficiency,
eg, Siemens applied ICPS in its Amberg factory, which achieved 75% production …

An Adaptive Scheme for Protecting Source Location Privacy in Underwater Acoustic Sensor Networks

H Wang, H Zheng, G Han… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Currently, the source location privacy (SLP) becomes a hot research interest in network
security of Underwater Acoustic Sensor Networks (UASNs), and existing schemes are …

A Confounding-Domain Randomized Approach for Providing Source Location Privacy Preservation for Wireless Sensor Networks

Nisha, S Suresh - IETE Technical Review, 2024 - Taylor & Francis
Wireless sensor networks (WSNs) have advanced technologically, allowing for a wide range
of Internet of Things (IoT) applications. The Internet of Things (IoT) provides a platform for …