A survey on location privacy protection in wireless sensor networks
Location of sensor nodes is one of the most important and fundamental information for
Wireless Sensor Networks (WSNs), because it provides basic support for many location …
Wireless Sensor Networks (WSNs), because it provides basic support for many location …
A dynamic multipath scheme for protecting source-location privacy using multiple sinks in WSNs intended for IIoT
Among several new technologies, such as social and cognitive mobile computing, wireless
sensor networks (WSNs) constitute the founding pillar of the industrial Internet of Things …
sensor networks (WSNs) constitute the founding pillar of the industrial Internet of Things …
A multi-round game-based source location privacy protection scheme with AUV enabled in underwater acoustic sensor networks
With a growing demand for the development of smart ocean projects, the Internet of
Underwater Things (IoUT) integrating multiple networks will gradually become the …
Underwater Things (IoUT) integrating multiple networks will gradually become the …
A probabilistic source location privacy protection scheme in wireless sensor networks
With the recent developments of wireless sensor networks (WSNs), computing and
communication have experienced huge advancement. Meanwhile, security has not received …
communication have experienced huge advancement. Meanwhile, security has not received …
A push-based probabilistic method for source location privacy protection in underwater acoustic sensor networks
As the research topics in ocean emerge, underwater acoustic sensor networks (UASNs)
have become ever more relevant. Consequently, challenges arise with the security and …
have become ever more relevant. Consequently, challenges arise with the security and …
A multi-channel interference based source location privacy protection scheme in underwater acoustic sensor networks
The Internet of Underwater Things (IoUT) gradually becomes the future direction of ocean.
Many devices, which are called the sources, are deployed in the sea to fulfill scientific …
Many devices, which are called the sources, are deployed in the sea to fulfill scientific …
A collision-free-transmission-based source location privacy protection scheme in UASNs under time slot allocation
Underwater acoustic sensor networks (UASNs) are data driven, and the data generation is
infeasible without source nodes, sensors, and equipment deployed underwater. However …
infeasible without source nodes, sensors, and equipment deployed underwater. However …
Secure and energy-efficient network topology obfuscation for software-defined WSNs
M Bin-Yahya, X Shen - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Network topology obfuscation (NTO) is generally considered as a promising proactive
mechanism to mitigate traffic analysis attacks. The main challenge is to strike a balance …
mechanism to mitigate traffic analysis attacks. The main challenge is to strike a balance …
AUV-assisted stratified source location privacy protection scheme based on network coding in UASNs
The position of the source is sensitive and critical information in underwater acoustic sensor
networks (UASNs). In this study, a network coding-based scheme called the stratified source …
networks (UASNs). In this study, a network coding-based scheme called the stratified source …
SSLP: A stratification-based source location privacy scheme in underwater acoustic sensor networks
Source location privacy (SLP) protection is an important means of security protection in
wireless sensor networks (WSNs). With the development of underwater acoustic sensor …
wireless sensor networks (WSNs). With the development of underwater acoustic sensor …