Providing source location privacy in wireless sensor networks: A survey

M Conti, J Willemsen, B Crispo - … Communications Surveys & …, 2013 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) consist of numerous small nodes that can sense, collect,
and disseminate information for many different types of applications. One of these …

Improving source location privacy in social internet of things using a hybrid phantom routing technique

T Hussain, B Yang, HU Rahman, A Iqbal, F Ali - Computers & Security, 2022 - Elsevier
Abstract The amalgamation of Smart IoT and Machine learning is an emerging research
area. In this context, a new trend in IoT called Social IoT has been considered for this study …

Evolving privacy: From sensors to the Internet of Things

J Lopez, R Rios, F Bao, G Wang - Future Generation Computer Systems, 2017 - Elsevier
Abstract The Internet of Things (IoT) envisions a world covered with billions of smart,
interacting things capable of offering all sorts of services to near and remote entities. The …

Recent advancements in privacy-aware protocols of source location privacy in wireless sensor networks: a survey

PK Roy, AK Tripathy, SK Singh, KC Li - Computer Science and …, 2022 - doiserbia.nb.rs
This review article summarises the protocols proposed in recent researches to secure
location information in Wireless Sensor Networks (WSNs). Due to their lightweightness and …

Don't shoot the messenger: Localization prevention of satellite internet users

D Koisser, R Mitev, M Chilese… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
Satellite Internet plays an increasingly important role in geopolitical conflicts. This notion
was affirmed in the Ukrainian conflict escalating at the beginning of 2022, with the large …

Probabilistic receiver-location privacy protection in wireless sensor networks

R Rios, J Cuellar, J Lopez - Information Sciences, 2015 - Elsevier
Wireless sensor networks (WSNs) are continually exposed to many types of attacks. Among
these, the attacks targeted at the base station are the most devastating ones since this …

Orbital Trust and Privacy:{SoK} on {PKI} and Location Privacy Challenges in Space Networks

D Koisser, R Mitev, N Yadav, F Vollmer… - 33rd USENIX Security …, 2024 - usenix.org
The dynamic evolution of the space sector, often referred to as" New Space," has led to
increased commercialization and innovation. This transformation is characterized by a surge …

A ring-based routing scheme for distributed energy resources management in iiot

Z Xiong, H Wang, L Zhang, T Fan, J Shen - IEEE Access, 2020 - ieeexplore.ieee.org
Recently, Distributed Energy Resources (DERs) have been utilized with increasing
frequency in Industrial Internet of Things (IIoT) to deal with energy and environmental …

Digital twin communities: an approach for secure DT data sharing

C Alcaraz, IH Meskini, J Lopez - International Journal of Information …, 2025 - Springer
Digital Twin (DT) technology empowers organizations to create virtual counterparts of their
physical assets, thereby magnifying their analytical, optimization and decision-making …

Providing users' anonymity in mobile hybrid networks

CA Ardagna, S Jajodia, P Samarati… - ACM Transactions on …, 2013 - dl.acm.org
We present a novel hybrid communication protocol that guarantees mobile users' anonymity
against a wide-range of adversaries by exploiting the capability of handheld devices to …