Providing source location privacy in wireless sensor networks: A survey

M Conti, J Willemsen, B Crispo - … Communications Surveys & …, 2013 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) consist of numerous small nodes that can sense, collect,
and disseminate information for many different types of applications. One of these …

A survey on location privacy protection in wireless sensor networks

J Jiang, G Han, H Wang, M Guizani - Journal of Network and Computer …, 2019 - Elsevier
Location of sensor nodes is one of the most important and fundamental information for
Wireless Sensor Networks (WSNs), because it provides basic support for many location …

Evolving privacy: From sensors to the Internet of Things

J Lopez, R Rios, F Bao, G Wang - Future Generation Computer Systems, 2017 - Elsevier
Abstract The Internet of Things (IoT) envisions a world covered with billions of smart,
interacting things capable of offering all sorts of services to near and remote entities. The …

A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things

G Han, L Zhou, H Wang, W Zhang, S Chan - Future Generation Computer …, 2018 - Elsevier
With the development of the Internet of Things (IoT), a more humanity-related network called
the Social Internet of Things (SIoT) is now evolving. WSNs are also part of the Social Internet …

Smart home privacy protection methods against a passive wireless snooping side-channel attack

MA Nassiri Abrishamchi, A Zainal, FA Ghaleb… - Sensors, 2022 - mdpi.com
Smart home technologies have attracted more users in recent years due to significant
advancements in their underlying enabler components, such as sensors, actuators, and …

Source-location privacy protection based on anonymity cloud in wireless sensor networks

N Wang, J Fu, J Li, BK Bhargava - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
An adversary can deploy parasitic sensor nodes into wireless sensor networks to collect
radio traffic distributions and trace back messages to their source nodes. Then, he can …

An anti-tracking source-location privacy protection protocol in WSNs based on path extension

W Tan, K Xu, D Wang - IEEE internet of things journal, 2014 - ieeexplore.ieee.org
In the application field using sensor networks to monitor valuable asset, source-location
anonymity is a serious concern. As a series of event packets are reported to the base station …

Traffic decorrelation techniques for countering a global eavesdropper in WSNs

A Proano, L Lazos, M Krunz - IEEE Transactions on Mobile …, 2016 - ieeexplore.ieee.org
We address the problem of preventing the inference of contextual information in event-
driven wireless sensor networks (WSNs). The problem is considered under a global …

Don't shoot the messenger: Localization prevention of satellite internet users

D Koisser, R Mitev, M Chilese… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
Satellite Internet plays an increasingly important role in geopolitical conflicts. This notion
was affirmed in the Ukrainian conflict escalating at the beginning of 2022, with the large …

Source-location privacy full protection in wireless sensor networks

N Wang, J Fu, J Zeng, BK Bhargava - Information Sciences, 2018 - Elsevier
In many scenarios, the locations of monitored targets need to be reported by source nodes,
but should remain anonymous in wireless sensor networks. Source-location privacy …