[Retracted] A Survey on Location Privacy Attacks and Prevention Deployed with IoT in Vehicular Networks

N Ahmed, Z Deng, I Memon, F Hassan… - Wireless …, 2022 - Wiley Online Library
Vehicular ad hoc networks (VANETs) connect two or more vehicles wirelessly to enable data
exchange in an Internet of Things (IoT) environment. In VANETs, location privacy is the most …

A survey on the role of industrial IOT in manufacturing for implementation of smart industry

MS Farooq, M Abdullah, S Riaz, A Alvi, F Rustam… - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) is an innovative technology that presents effective and attractive
solutions to revolutionize various domains. Numerous solutions based on the IoT have been …

An efficient and lightweight identity-based scheme for secure communication in clustered wireless sensor networks

F Mezrag, S Bitam, A Mellouk - Journal of Network and Computer …, 2022 - Elsevier
Abstract Clustered Wireless Sensor Networks (CWSNs) are typically deployed in unsecured
or even hostile areas, making them vulnerable to many cyber-attacks and security threats …

A survey and experimental study on privacy-preserving trajectory data publishing

F Jin, W Hua, M Francia, P Chao… - … on Knowledge and …, 2022 - ieeexplore.ieee.org
Trajectory data has become ubiquitous nowadays, which can benefit various real-world
applications such as traffic management and location-based services. However, trajectories …

Privacy-preserving generation and publication of synthetic trajectory microdata: A comprehensive survey

JW Kim, B Jang - Journal of Network and Computer Applications, 2024 - Elsevier
The generation of trajectory data has increased dramatically with the advent and
widespread use of GPS-enabled devices. This rich source of data provides invaluable …

A survey on indoor positioning security and privacy

Y Sartayeva, HCB Chan - Computers & Security, 2023 - Elsevier
With rising demand for indoor location-based services (LBS) such as location-based
marketing, mobile navigation, etc., there has been considerable interest in indoor …

Localization and detection of multiple attacks in wireless sensor networks using artificial neural network

GG Gebremariam, J Panda… - … and Mobile Computing, 2023 - Wiley Online Library
Security enhancement in wireless sensor networks (WSNs) is significant in different
applications. The advancement of routing attack localization is a crucial security research …

Optimal path selection using reinforcement learning based ant colony optimization algorithm in IoT-Based wireless sensor networks with 5G technology

GP Dubey, S Stalin, O Alqahtani, A Alasiry… - Computer …, 2023 - Elsevier
Abstract The Internet of Things (IoTs) expanded quickly, giving rise to numerous services,
apps, electronic devices with integrated sensors, and associated protocols, which are still …

Task allocation under geo-indistinguishability via group-based noise addition

P Zhang, X Cheng, S Su, N Wang - IEEE Transactions on Big …, 2022 - ieeexplore.ieee.org
Locations are usually necessary for task allocation in spatial crowdsourcing, which may put
individual privacy in jeopardy without proper protection. Although existing studies have well …

A collision-free-transmission-based source location privacy protection scheme in UASNs under time slot allocation

G Han, Y Liu, H Wang, Y Zhang - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Underwater acoustic sensor networks (UASNs) are data driven, and the data generation is
infeasible without source nodes, sensors, and equipment deployed underwater. However …