J Lopez, R Roman, C Alcaraz - … School on Foundations of Security Analysis …, 2007 - Springer
As sensor networks are more and more being implemented in real world settings, it is necessary to analyze how the different requirements of these real-world applications can …
H Wang, B Sheng, Q Li - Computer Networks, 2009 - Elsevier
A typical sensor network application is to monitor objects, including wildlife, vehicles and events, in which information about an object is periodically sent back to the sink. Many times …
A major limitation to the use of wireless sensor networks (WSNs) in asset monitoring applications is security and privacy, particularly the privacy of source location information. In …
Privacy of critical locations (or events) is essential when monitored by wireless sensor networks. To mitigate such issues, in this article, a new privacy protection technique named …
G Han, Y Liu, H Wang, Y Zhang - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Underwater acoustic sensor networks (UASNs) are data driven, and the data generation is infeasible without source nodes, sensors, and equipment deployed underwater. However …
R Manjula, R Datta - Pervasive and Mobile Computing, 2018 - Elsevier
In this paper, we propose a two-phase routing technique using multiple virtual sources to provide enhanced source location privacy in Wireless Sensor Networks (WSNs). We use the …
H Wang, G Han, Y Liu, A Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The position of the source is sensitive and critical information in underwater acoustic sensor networks (UASNs). In this study, a network coding-based scheme called the stratified source …
In recent times, the wireless sensor network (WSN) has become an integral part of daily life. WSN forms the necessary foundation for several important applications such as animal …
The mobile crowdsensing (MCS) paradigm enables large-scale sensing opportunities at lower deployment costs than dedicated infrastructures by utilizing today¿ s large number of …