Recent advancements in privacy-aware protocols of source location privacy in wireless sensor networks: a survey
This review article summarises the protocols proposed in recent researches to secure
location information in Wireless Sensor Networks (WSNs). Due to their lightweightness and …
location information in Wireless Sensor Networks (WSNs). Due to their lightweightness and …
Secure routing protocols for source node privacy protection in multi-hop communication wireless networks
LC Mutalemwa, S Shin - Energies, 2020 - mdpi.com
Traffic analysis attacks are common in monitoring wireless sensor networks (WSNs). In the
attacks, adversaries analyze the traffic pattern to obtain critical information such as the …
attacks, adversaries analyze the traffic pattern to obtain critical information such as the …
Analysis of Context-Oriented Source Location Privacy Preservation Techniques for Wireless Sensor Networks
N Singh, S Suresh - SN Computer Science, 2023 - Springer
The rapidly advancing Internet of things has eventually led to both dependency and
efficiency in almost all walks of life. However, with every benefit, there comes a threat to the …
efficiency in almost all walks of life. However, with every benefit, there comes a threat to the …
Source location privacy preservation in IoT-enabled event-driven WSNs
Purpose Privacy preservation is a significant concern in Internet of Things (IoT)-enabled
event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven …
event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven …
Novel Approaches to realize the Reliability of location privacy protocols in monitoring wireless networks
LC Mutalemwa, S Shin - IEEE Access, 2021 - ieeexplore.ieee.org
Wireless sensor network (WSN) technology presents significant advantages for Internet of
Things (IoT). Sensor-based IoT networks are designed to operate in unattended, harsh, and …
Things (IoT). Sensor-based IoT networks are designed to operate in unattended, harsh, and …
Security, privacy, and trustworthiness of sensor networks and internet of things
S Katsikas, V Gkioulos - Sensors, 2020 - mdpi.com
This editorial gives an overview of the papers included in the Special Issue on “Security,
Privacy, and Trustworthiness of Sensor Networks and Internet of Things” of Sensors. The …
Privacy, and Trustworthiness of Sensor Networks and Internet of Things” of Sensors. The …
[HTML][HTML] Enhancing Smart Parking Management through Machine Learning and AI Integration in IoT Environments
V Knights, O Petrovska, M Prchkovska - 2024 - intechopen.com
The integration of Internet of Things (IoT) technology has profoundly transformed urban life,
particularly in the realm of parking management. Smart parking systems harness the …
particularly in the realm of parking management. Smart parking systems harness the …
On the Use of Wireless Technologies for Wildlife Monitoring: Wireless Sensor Network Routing Protocols
L Mutalemwa - Tanzania Journal of Engineering and Technology, 2023 - ajol.info
Traditional methods for wildlife monitoring are labor-intensive and time-consuming.
Therefore, advanced technologies and remote monitoring methods are becoming …
Therefore, advanced technologies and remote monitoring methods are becoming …
Achieving Reliability of Privacy-preserving Phantom Routing Protocols in Multi-hop Wireless Sensor Networks
L Mutalemwa - Journal of Telecommunications and Information …, 2024 - jtit.pl
Due to the open nature of wireless channels and sensor node resource constraints, it is
challenging to secure the communication in wireless sensor networks (WSNs) while …
challenging to secure the communication in wireless sensor networks (WSNs) while …
Controlling the communication overhead of source location privacy protocols in multi-hop communication wireless networks
LC Mutalemwa, M Kang, S Shin - … International Conference on …, 2020 - ieeexplore.ieee.org
Fake source packet routing protocols can ensure Source Location Privacy (SLP) protection.
However, the protocols have demonstrated some performance limitations including high …
However, the protocols have demonstrated some performance limitations including high …