Velocity-free localization of autonomous driverless vehicles in underground intelligent mines

L Dong, D Sun, G Han, X Li, Q Hu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The rapid progress of science and technology has created favorable conditions for the
development of autonomous driverless vehicles. However, the complex conditions in the …

AUV-aided data importance based scheme for protecting location privacy in smart ocean

G Han, Y Chen, H Wang, Y He… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Data collection in underwater acoustic sensor networks (UASNs) and the exposure of node
location information pose a threat to the security of the entire network. Therefore, the main …

Recent advancements in privacy-aware protocols of source location privacy in wireless sensor networks: a survey

PK Roy, AK Tripathy, SK Singh, KC Li - Computer Science and …, 2022 - doiserbia.nb.rs
This review article summarises the protocols proposed in recent researches to secure
location information in Wireless Sensor Networks (WSNs). Due to their lightweightness and …

Position-independent and section-based source location privacy protection in WSN

F Mukamanzi, M Raja, T Koduru… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Privacy of critical locations (or events) is essential when monitored by wireless sensor
networks. To mitigate such issues, in this article, a new privacy protection technique named …

Routing technique in location source privacy for wireless sensor network: A review

Y Yanti, Y Away, TY Arif, N Nasaruddin - AIP Conference Proceedings, 2024 - pubs.aip.org
In a wireless sensor network context, a wireless sensor network (WSN) is a collection of
sensor nodes made up of small nodes with minimal energy resources and powered solely …

Intelligent privacy protection of end user in long distance education

Y Li, J Zhu, W Fu - Mobile Networks and Applications, 2022 - Springer
Long distance education is an important part during the COVID-19 age. An intelligent
privacy protection with higher effect for the end users is an urgent problem in long distance …

Privacy-preserving link scheduling for wireless networks

M Abbasalizadeh, J Chan, P Rayavaram, Y Chen… - IEEE …, 2024 - ieeexplore.ieee.org
Wireless communication is now a cornerstone of modern society, propelled by the
widespread adoption of IoT devices and sophisticated wireless technologies. As wireless …

Secure routing protocols for source node privacy protection in multi-hop communication wireless networks

LC Mutalemwa, S Shin - Energies, 2020 - mdpi.com
Traffic analysis attacks are common in monitoring wireless sensor networks (WSNs). In the
attacks, adversaries analyze the traffic pattern to obtain critical information such as the …

Regulating the packet transmission cost of source location privacy routing schemes in event monitoring wireless networks

LC Mutalemwa, S Shin - IEEE Access, 2019 - ieeexplore.ieee.org
Sensor nodes in wireless sensor networks (WSNs) are usually battery-operated and
resource-constrained. The sensor nodes are often deployed in remote areas where the …

Anonymous cluster-based source location protection in underwater pipeline monitoring operations

G Han, A Gong, H Wang, C Lin… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Submarine pipelines are among the most efficient methods of marine oil transportation, and
they are widely used in offshore oil exploitation. However, the complex environment of the …