An Overview of Privacy Dimensions on the Industrial Internet of Things (IIoT)

V Demertzi, S Demertzis, K Demertzis - Algorithms, 2023 - mdpi.com
The rapid advancements in technology have given rise to groundbreaking solutions and
practical applications in the field of the Industrial Internet of Things (IIoT). These …

Privacy in the Internet of Things: threats and challenges

JH Ziegeldorf, OG Morchon… - Security and …, 2014 - Wiley Online Library
ABSTRACT The Internet of Things paradigm envisions the pervasive interconnection and
cooperation of smart things over the current and future Internet infrastructure. The Internet of …

Probabilistic receiver-location privacy protection in wireless sensor networks

R Rios, J Cuellar, J Lopez - Information Sciences, 2015 - Elsevier
Wireless sensor networks (WSNs) are continually exposed to many types of attacks. Among
these, the attacks targeted at the base station are the most devastating ones since this …

An improved source location privacy protection using adaptive trust sector-based authentication with honey encryption algorithm in WSN

A Arivarasi, P Ramesh - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
A wireless sensor network is a set of sensor nodes used to identify the environment and the
corresponding object. It collects all the data of the situation and transmits this detected data …

Network Security and Privacy for Cyber‐Physical Systems

M Henze, J Hiller, R Hummen, R Matzutt… - Security and Privacy …, 2017 - Wiley Online Library
Cyber‐physical systems (CPSs) are expected to collect, process, and exchange data that
regularly contain sensitive information. CPSs may, for example, involve a person in the …

Location privacy in WSNs: solutions, challenges, and future trends

R Rios, J Lopez, J Cuellar - Foundations of Security Analysis and Design …, 2014 - Springer
Privacy preservation is gaining popularity in Wireless Sensor Network (WSNs) due to its
adoption in everyday scenarios. There are a number of research papers in this area many of …

Preserving receiver-location privacy in wireless sensor networks

J Lopez, R Rios, J Cuellar - … Conference, ISPEC 2014, Fuzhou, China, May …, 2014 - Springer
Wireless sensor networks (WSNs) are exposed to many different types of attacks. Among
these, the most devastating attack is to compromise or destroy the base station since all …

[HTML][HTML] Wireless Sensor Networks

C Tip, SREY Norm - 2008 - nics.uma.es
In addition to our work on the Internet of Things, NICS was also involved in the security of
sensor devices that are not directly connected to the Internet: Wireless Sensor Networks …

[PDF][PDF] Architectural Support for Managing Privacy Tradeoff s in the Internet

D Naylor - reports-archive.adm.cs.cmu.edu
Using a communication network entails an inherent privacy risk: packets cross an
infrastructure maintained by several parties other than the sender and receiver, each of …

[PDF][PDF] Privacy of Contextual Information in Wireless Sensor Networks.

AAP Lozada - 2015 - uweb.engr.arizona.edu
Continuous advances in electronics, wireless technologies, manufacturing processes, and
software engineering have led to the proliferation of a plethora of mobile devices–mobile …