A comprehensive survey on trajectory schemes for data collection using mobile elements in WSNs

SK Singh, P Kumar - Journal of Ambient Intelligence and Humanized …, 2020 - Springer
Mobile elements trajectory optimization is one of the most important and efficient ways to
enhance the performance of wireless sensor networks (WSNs). In the last 15 years …

Improving source location privacy in social internet of things using a hybrid phantom routing technique

T Hussain, B Yang, HU Rahman, A Iqbal, F Ali - Computers & Security, 2022 - Elsevier
Abstract The amalgamation of Smart IoT and Machine learning is an emerging research
area. In this context, a new trend in IoT called Social IoT has been considered for this study …

A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things

G Han, L Zhou, H Wang, W Zhang, S Chan - Future Generation Computer …, 2018 - Elsevier
With the development of the Internet of Things (IoT), a more humanity-related network called
the Social Internet of Things (SIoT) is now evolving. WSNs are also part of the Social Internet …

CPSLP: A cloud-based scheme for protecting source location privacy in wireless sensor networks using multi-sinks

G Han, X Miao, H Wang, M Guizani… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Source location privacy is a major problem in wireless sensor networks (WSNs). WSNs are
usually deployed in random areas with no protection. The source location reveals valuable …

Recent advancements in privacy-aware protocols of source location privacy in wireless sensor networks: a survey

PK Roy, AK Tripathy, SK Singh, KC Li - Computer Science and …, 2022 - doiserbia.nb.rs
This review article summarises the protocols proposed in recent researches to secure
location information in Wireless Sensor Networks (WSNs). Due to their lightweightness and …

Hybrid online protocols for source location privacy in wireless sensor networks

M Bradbury, A Jhumka, M Leeke - Journal of Parallel and Distributed …, 2018 - Elsevier
Wireless sensor networks (WSNs) will form the building blocks of many novel applications
such as asset monitoring. These applications will have to guarantee that the location of the …

Attacker location evaluation-based fake source scheduling for source location privacy in cyber-physical systems

Z Hong, R Wang, S Ji, R Beyah - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cyber-physical systems (CPS) have been deployed in many areas and have reached
unprecedented levels of performance and efficiency. However, the security and privacy …

Constrained random routing mechanism for source privacy protection in WSNs

W Chen, M Zhang, G Hu, X Tang, AK Sangaiah - IEEE Access, 2017 - ieeexplore.ieee.org
In wireless sensor networks, it is a typical threat to source privacy that an attacker performs
backtracing strategy to locate source nodes by analyzing transmission paths. With the …

Secure routing protocols for source node privacy protection in multi-hop communication wireless networks

LC Mutalemwa, S Shin - Energies, 2020 - mdpi.com
Traffic analysis attacks are common in monitoring wireless sensor networks (WSNs). In the
attacks, adversaries analyze the traffic pattern to obtain critical information such as the …

Source location privacy preservation in IoT-enabled event-driven WSNs

N Sharma, R Bhatt - International Journal of Pervasive Computing and …, 2023 - emerald.com
Purpose Privacy preservation is a significant concern in Internet of Things (IoT)-enabled
event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven …