G Han, Y Chen, H Wang, Y He… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Data collection in underwater acoustic sensor networks (UASNs) and the exposure of node location information pose a threat to the security of the entire network. Therefore, the main …
This review article summarises the protocols proposed in recent researches to secure location information in Wireless Sensor Networks (WSNs). Due to their lightweightness and …
Privacy of critical locations (or events) is essential when monitored by wireless sensor networks. To mitigate such issues, in this article, a new privacy protection technique named …
In a wireless sensor network context, a wireless sensor network (WSN) is a collection of sensor nodes made up of small nodes with minimal energy resources and powered solely …
Y Li, J Zhu, W Fu - Mobile Networks and Applications, 2022 - Springer
Long distance education is an important part during the COVID-19 age. An intelligent privacy protection with higher effect for the end users is an urgent problem in long distance …
Wireless communication is now a cornerstone of modern society, propelled by the widespread adoption of IoT devices and sophisticated wireless technologies. As wireless …
Traffic analysis attacks are common in monitoring wireless sensor networks (WSNs). In the attacks, adversaries analyze the traffic pattern to obtain critical information such as the …
Sensor nodes in wireless sensor networks (WSNs) are usually battery-operated and resource-constrained. The sensor nodes are often deployed in remote areas where the …
G Han, A Gong, H Wang, C Lin… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Submarine pipelines are among the most efficient methods of marine oil transportation, and they are widely used in offshore oil exploitation. However, the complex environment of the …