Efficient privacy-preserving in IoMT with blockchain and lightweight secret sharing

C Li, M Dong, X Xin, J Li, XB Chen… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Internet of Medical Things (IoMT) aggregates a series of smart medical devices and fully
uses the collected health data to improve user experience, medical resource utilization, and …

Deep federated learning enhanced secure POI microservices for cyber-physical systems

Z Guo, K Yu, Z Lv, KKR Choo, P Shi… - IEEE Wireless …, 2022 - ieeexplore.ieee.org
An essential consideration in cyber-physical systems (CPS) is the ability to support secure
communication services, such as points of interest (POI) microservices. Existing approaches …

Cuckoo search algorithm with fuzzy logic and Gauss–Cauchy for minimizing localization error of WSN

X Ou, M Wu, Y Pu, B Tu, G Zhang, Z Xu - Applied Soft Computing, 2022 - Elsevier
The location of the sensor node is critical in wireless sensor networks (WSN) as the
information acquired by the sensor node may be worthless without knowing its source …

AUV-aided data importance based scheme for protecting location privacy in smart ocean

G Han, Y Chen, H Wang, Y He… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Data collection in underwater acoustic sensor networks (UASNs) and the exposure of node
location information pose a threat to the security of the entire network. Therefore, the main …

A multi-round game-based source location privacy protection scheme with AUV enabled in underwater acoustic sensor networks

H Wang, G Han, W Lai, Y Hou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With a growing demand for the development of smart ocean projects, the Internet of
Underwater Things (IoUT) integrating multiple networks will gradually become the …

RNN-DP: A new differential privacy scheme base on Recurrent Neural Network for Dynamic trajectory privacy protection

S Chen, A Fu, J Shen, S Yu, H Wang, H Sun - Journal of Network and …, 2020 - Elsevier
Mobile devices furnish users with various services while on the move, but also raise public
concerns about trajectory privacy. Unfortunately, traditional privacy protection methods, such …

Privacy-preserving cloud computing: ecosystem, life cycle, layered architecture and future roadmap

S Ahmadi, M Salehfar - arXiv preprint arXiv:2204.11120, 2022 - arxiv.org
Privacy-Preserving Cloud Computing is an emerging technology with many applications in
various fields. Cloud computing is important because it allows for scalability, adaptability …

Protecting source location privacy in IoT-Enabled wireless sensor networks: the case of multiple Assets

R Manjula, T Koduru, R Datta - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
A major limitation to the use of wireless sensor networks (WSNs) in asset monitoring
applications is security and privacy, particularly the privacy of source location information. In …

Recent advancements in privacy-aware protocols of source location privacy in wireless sensor networks: a survey

PK Roy, AK Tripathy, SK Singh, KC Li - Computer Science and …, 2022 - doiserbia.nb.rs
This review article summarises the protocols proposed in recent researches to secure
location information in Wireless Sensor Networks (WSNs). Due to their lightweightness and …

A multi-channel interference based source location privacy protection scheme in underwater acoustic sensor networks

H Wang, G Han, Y Hou, M Guizani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Internet of Underwater Things (IoUT) gradually becomes the future direction of ocean.
Many devices, which are called the sources, are deployed in the sea to fulfill scientific …