Improving source location privacy in social internet of things using a hybrid phantom routing technique

T Hussain, B Yang, HU Rahman, A Iqbal, F Ali - Computers & Security, 2022 - Elsevier
Abstract The amalgamation of Smart IoT and Machine learning is an emerging research
area. In this context, a new trend in IoT called Social IoT has been considered for this study …

[HTML][HTML] Security with Wireless Sensor Networks in Smart Grids: A Review

S Yilmaz, M Dener - Symmetry, 2024 - mdpi.com
Smart Grids are an area where next-generation technologies, applications, architectures,
and approaches are utilized. These grids involve equipping and managing electrical …

CPSLP: A cloud-based scheme for protecting source location privacy in wireless sensor networks using multi-sinks

G Han, X Miao, H Wang, M Guizani… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Source location privacy is a major problem in wireless sensor networks (WSNs). WSNs are
usually deployed in random areas with no protection. The source location reveals valuable …

Improving communication precision of IoT through behavior-based learning in smart city environment

D Li, L Deng, W Liu, Q Su - Future generation computer systems, 2020 - Elsevier
Abstract Internet of Things (IoT) is an emergent heterogeneous communication platform that
provides ubiquitous access to resources and meets the user demands. Developing smart …

Position-independent and section-based source location privacy protection in WSN

F Mukamanzi, M Raja, T Koduru… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Privacy of critical locations (or events) is essential when monitored by wireless sensor
networks. To mitigate such issues, in this article, a new privacy protection technique named …

Routing technique in location source privacy for wireless sensor network: A review

Y Yanti, Y Away, TY Arif, N Nasaruddin - AIP Conference Proceedings, 2024 - pubs.aip.org
In a wireless sensor network context, a wireless sensor network (WSN) is a collection of
sensor nodes made up of small nodes with minimal energy resources and powered solely …

Secure routing protocols for source node privacy protection in multi-hop communication wireless networks

LC Mutalemwa, S Shin - Energies, 2020 - mdpi.com
Traffic analysis attacks are common in monitoring wireless sensor networks (WSNs). In the
attacks, adversaries analyze the traffic pattern to obtain critical information such as the …

Analysis on energy consumption in smart grid WSN using path operator calculus centrality based HSA-PSO algorithm

R Hemalatha, R Prakash, C Sivapragash - Soft Computing, 2020 - Springer
In this paper, the consumption of energy is efficiently balanced using the high searching
capability of harmony search algorithm (HSA). However, centrality in finding the route is …

Source location privacy preservation in IoT-enabled event-driven WSNs

N Sharma, R Bhatt - International Journal of Pervasive Computing and …, 2023 - emerald.com
Purpose Privacy preservation is a significant concern in Internet of Things (IoT)-enabled
event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven …

Awareness based gannet optimization for source location privacy preservation with multiple assets in wireless sensor networks

M Singh, MP Singh - Concurrency and Computation: Practice …, 2024 - Wiley Online Library
The wireless sensor network (WSN) has been assimilated into modern society and is utilized
in many crucial application domains, including animal monitoring, border surveillance, asset …