Providing source location privacy in wireless sensor networks: A survey
M Conti, J Willemsen, B Crispo - … Communications Surveys & …, 2013 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) consist of numerous small nodes that can sense, collect,
and disseminate information for many different types of applications. One of these …
and disseminate information for many different types of applications. One of these …
A survey on location privacy protection in wireless sensor networks
Location of sensor nodes is one of the most important and fundamental information for
Wireless Sensor Networks (WSNs), because it provides basic support for many location …
Wireless Sensor Networks (WSNs), because it provides basic support for many location …
Evolving privacy: From sensors to the Internet of Things
Abstract The Internet of Things (IoT) envisions a world covered with billions of smart,
interacting things capable of offering all sorts of services to near and remote entities. The …
interacting things capable of offering all sorts of services to near and remote entities. The …
A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things
With the development of the Internet of Things (IoT), a more humanity-related network called
the Social Internet of Things (SIoT) is now evolving. WSNs are also part of the Social Internet …
the Social Internet of Things (SIoT) is now evolving. WSNs are also part of the Social Internet …
Smart home privacy protection methods against a passive wireless snooping side-channel attack
Smart home technologies have attracted more users in recent years due to significant
advancements in their underlying enabler components, such as sensors, actuators, and …
advancements in their underlying enabler components, such as sensors, actuators, and …
Source-location privacy protection based on anonymity cloud in wireless sensor networks
An adversary can deploy parasitic sensor nodes into wireless sensor networks to collect
radio traffic distributions and trace back messages to their source nodes. Then, he can …
radio traffic distributions and trace back messages to their source nodes. Then, he can …
An anti-tracking source-location privacy protection protocol in WSNs based on path extension
In the application field using sensor networks to monitor valuable asset, source-location
anonymity is a serious concern. As a series of event packets are reported to the base station …
anonymity is a serious concern. As a series of event packets are reported to the base station …
Traffic decorrelation techniques for countering a global eavesdropper in WSNs
We address the problem of preventing the inference of contextual information in event-
driven wireless sensor networks (WSNs). The problem is considered under a global …
driven wireless sensor networks (WSNs). The problem is considered under a global …
Don't shoot the messenger: Localization prevention of satellite internet users
Satellite Internet plays an increasingly important role in geopolitical conflicts. This notion
was affirmed in the Ukrainian conflict escalating at the beginning of 2022, with the large …
was affirmed in the Ukrainian conflict escalating at the beginning of 2022, with the large …
Source-location privacy full protection in wireless sensor networks
In many scenarios, the locations of monitored targets need to be reported by source nodes,
but should remain anonymous in wireless sensor networks. Source-location privacy …
but should remain anonymous in wireless sensor networks. Source-location privacy …