Providing source location privacy in wireless sensor networks: A survey

M Conti, J Willemsen, B Crispo - … Communications Surveys & …, 2013 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) consist of numerous small nodes that can sense, collect,
and disseminate information for many different types of applications. One of these …

Analysis of security threats, requirements, technologies and standards in wireless sensor networks

J Lopez, R Roman, C Alcaraz - … School on Foundations of Security Analysis …, 2007 - Springer
As sensor networks are more and more being implemented in real world settings, it is
necessary to analyze how the different requirements of these real-world applications can …

Privacy-aware routing in sensor networks

H Wang, B Sheng, Q Li - Computer Networks, 2009 - Elsevier
A typical sensor network application is to monitor objects, including wildlife, vehicles and
events, in which information about an object is periodically sent back to the sink. Many times …

Protecting source location privacy in IoT-Enabled wireless sensor networks: the case of multiple Assets

R Manjula, T Koduru, R Datta - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
A major limitation to the use of wireless sensor networks (WSNs) in asset monitoring
applications is security and privacy, particularly the privacy of source location information. In …

Position-independent and section-based source location privacy protection in WSN

F Mukamanzi, M Raja, T Koduru… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Privacy of critical locations (or events) is essential when monitored by wireless sensor
networks. To mitigate such issues, in this article, a new privacy protection technique named …

A collision-free-transmission-based source location privacy protection scheme in UASNs under time slot allocation

G Han, Y Liu, H Wang, Y Zhang - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Underwater acoustic sensor networks (UASNs) are data driven, and the data generation is
infeasible without source nodes, sensors, and equipment deployed underwater. However …

A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs

R Manjula, R Datta - Pervasive and Mobile Computing, 2018 - Elsevier
In this paper, we propose a two-phase routing technique using multiple virtual sources to
provide enhanced source location privacy in Wireless Sensor Networks (WSNs). We use the …

AUV-assisted stratified source location privacy protection scheme based on network coding in UASNs

H Wang, G Han, Y Liu, A Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
The position of the source is sensitive and critical information in underwater acoustic sensor
networks (UASNs). In this study, a network coding-based scheme called the stratified source …

SLP-RRFPR: a source location privacy protection scheme based on random ring and limited hop fake packet routing for wireless sensor networks

A Shukla, D Singh, M Sajwan, M Kumar… - Multimedia Tools and …, 2022 - Springer
In recent times, the wireless sensor network (WSN) has become an integral part of daily life.
WSN forms the necessary foundation for several important applications such as animal …

Crowdsensing the speaker count in the wild: Implications and applications

C Xu, S Li, Y Zhang, E Miluzzo… - IEEE Communications …, 2014 - ieeexplore.ieee.org
The mobile crowdsensing (MCS) paradigm enables large-scale sensing opportunities at
lower deployment costs than dedicated infrastructures by utilizing today¿ s large number of …