Towards Resilient Machine Learning Models: Addressing Adversarial Attacks in Wireless Sensor Network
Adversarial attacks represent a substantial threat to the security and reliability of machine
learning models employed in wireless sensor networks (WSNs). This study tries to solve this …
learning models employed in wireless sensor networks (WSNs). This study tries to solve this …
Analysis of Context-Oriented Source Location Privacy Preservation Techniques for Wireless Sensor Networks
N Singh, S Suresh - SN Computer Science, 2023 - Springer
The rapidly advancing Internet of things has eventually led to both dependency and
efficiency in almost all walks of life. However, with every benefit, there comes a threat to the …
efficiency in almost all walks of life. However, with every benefit, there comes a threat to the …
Source location privacy preservation in IoT-enabled event-driven WSNs
Purpose Privacy preservation is a significant concern in Internet of Things (IoT)-enabled
event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven …
event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven …
A novel deception-based scheme to secure the location information for iobt entities
The Internet of Battlefield Things (IoBT) is a subdomain of the Internet of Things (IoT) that
applies to a battlefield. Due to the limited communication infrastructure, the entities in the …
applies to a battlefield. Due to the limited communication infrastructure, the entities in the …
Gray wolf optimizer with communication strategy based on DV-Hop for nodes location of wireless sensor networks
D Yu, T Yuan, H Qing, W Xie, P Zhu - IEEE Access, 2024 - ieeexplore.ieee.org
Node localization remains a pivotal research challenge in Wireless Sensor Networks (WSN).
The DV-Hop method, which estimates the positions of unknown nodes using anchor nodes …
The DV-Hop method, which estimates the positions of unknown nodes using anchor nodes …
A Total Randomized SLP-Preserving Technique with Improved Privacy and Lifetime in WSNs for IoT and the Impact of Radio Range on SLP
Enhanced source location privacy and prolonged network lifetime are imperative for WSNs—
the skin of IoT. To address these issues, a novel technique named source location privacy …
the skin of IoT. To address these issues, a novel technique named source location privacy …
Multi-AUV Collaboration Assisted Location Privacy Protection Scheme in Unknown Marine Environments
H Wang, G Han, D Tang… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
With the increase in the status of the ocean, the development of ocean resources is a
priority, as is ocean security. Ocean security contains several aspects, such as equipment …
priority, as is ocean security. Ocean security contains several aspects, such as equipment …
A Source Location Privacy Preservation Method Using Mixed Fake Sources and Phantoms
Industrial cyber-physical systems (ICPS) have significantly improved production efficiency,
eg, Siemens applied ICPS in its Amberg factory, which achieved 75% production …
eg, Siemens applied ICPS in its Amberg factory, which achieved 75% production …
An Adaptive Scheme for Protecting Source Location Privacy in Underwater Acoustic Sensor Networks
H Wang, H Zheng, G Han… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Currently, the source location privacy (SLP) becomes a hot research interest in network
security of Underwater Acoustic Sensor Networks (UASNs), and existing schemes are …
security of Underwater Acoustic Sensor Networks (UASNs), and existing schemes are …
A Confounding-Domain Randomized Approach for Providing Source Location Privacy Preservation for Wireless Sensor Networks
Wireless sensor networks (WSNs) have advanced technologically, allowing for a wide range
of Internet of Things (IoT) applications. The Internet of Things (IoT) provides a platform for …
of Internet of Things (IoT) applications. The Internet of Things (IoT) provides a platform for …