Toward a statistical framework for source anonymity in sensor networks
In certain applications, the locations of events reported by a sensor network need to remain
anonymous. That is, unauthorized observers must be unable to detect the origin of such …
anonymous. That is, unauthorized observers must be unable to detect the origin of such …
Anti-traffic analysis attack for location privacy in WSNs
B Di Ying, D Makrakis, HT Mouftah - EURASIP Journal on Wireless …, 2014 - Springer
Traditional encryption and authentication methods are not effective in preserving a sink's
location privacy from a global adversary that is monitoring the network traffic. In this paper …
location privacy from a global adversary that is monitoring the network traffic. In this paper …
Enhancing Sink-Location Privacy in Wireless Sensor Networks through k-Anonymity
Due to the shared nature of wireless communication media, a powerful adversary can
eavesdrop on the entire radio communication in the network and obtain the contextual …
eavesdrop on the entire radio communication in the network and obtain the contextual …
Adaptive network defense management for countering smart attack and selective capture in wireless sensor networks
H Al-Hamadi, R Chen - IEEE Transactions on Network and …, 2015 - ieeexplore.ieee.org
We propose and analyze adaptive network defense management for countering smart attack
and selective capture which aim to cripple the basic data delivery functionality of a base …
and selective capture which aim to cripple the basic data delivery functionality of a base …
A protocol for sink location privacy protection in wireless sensor networks
B Ying, D Makrakis, HT Mouftah - 2011 IEEE Global …, 2011 - ieeexplore.ieee.org
Due to the broadcasting nature of wireless sensor networks, it is relatively easy for an
adversary to discover the sinks' location through traffic volume analysis. Traditional …
adversary to discover the sinks' location through traffic volume analysis. Traditional …
Inspecting the ways of source anonymity in wireless sensor network
RD Shinganjude, DP Theng - 2014 Fourth International …, 2014 - ieeexplore.ieee.org
Sensor networks mainly deployed to monitor and report real events, and thus it is very
difficult and expensive to achieve event source anonymity for it, as sensor networks are very …
difficult and expensive to achieve event source anonymity for it, as sensor networks are very …
无线传感器网络匿名通信技术研究进展
房卫东, 李凤荣, 单联海, 何为, 王营冠 - 北京邮电大学学报, 2017 - journal.bupt.edu.cn
信息安全(内容安全和通信安全) 一直是无线传感器网络(WSN) 研究与应用关注的热点.
由于传感器节点能量, 计算和内存限制以及部署环境的特殊性, WSN 难以适用复杂度高的安全 …
由于传感器节点能量, 计算和内存限制以及部署环境的特殊性, WSN 难以适用复杂度高的安全 …
Research and Development of Privacy Protection of WSN Routing Protocol
P Liu, F Xu, Y Zhu - Security, Privacy, and Anonymity in Computation …, 2021 - Springer
WSN has developed rapidly in the past few decades based on its low-cost, short-distance
and easy-deployment features. However, due to the openness of wireless communication …
and easy-deployment features. However, due to the openness of wireless communication …
[PDF][PDF] By Using Effective Mechanism for Detection and Prevention of Routing Attacks in Mobile Networks
K Meghana, K Manohar - ijetcse.com
In Recent days in the group mobile user's communication, group key management was
found to be challenging in the decentralized environments because of its dynamic nature …
found to be challenging in the decentralized environments because of its dynamic nature …
Geo-based Mobility Control for Mobile Traffic Simulators
P Dahlström - 2013 - diva-portal.org
Most mobile traffic simulators of today depend on the user to supply the mobility behavior of
the simulated UEs. This becomes a problem when certain wanted mobility characteristics …
the simulated UEs. This becomes a problem when certain wanted mobility characteristics …