MMEA Mahmoud, X Shen - IEEE Transactions on Parallel and …, 2011 - ieeexplore.ieee.org
In wireless sensor networks, adversaries can make use of the traffic information to locate the monitored objects, eg, to hunt endangered animals or kill soldiers. In this paper, we first …
J Long, M Dong, K Ota, A Liu - IEEE Access, 2014 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) have been proliferating due to their wide applications in both military and commercial use. However, one critical challenge to WSNs implementation …
Y Zhang, Q Chen, S Zhong - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
Mobile phone sensing provides a promising paradigm for collecting sensing data and has been receiving increasing attention in recent years. Different from most existing works, which …
N Wang, J Fu, J Li, BK Bhargava - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
An adversary can deploy parasitic sensor nodes into wireless sensor networks to collect radio traffic distributions and trace back messages to their source nodes. Then, he can …
J Long, A Liu, M Dong, Z Li - Journal of parallel and Distributed computing, 2015 - Elsevier
Sink location privacy is one of the major issues in Wireless Sensor Networks (WSNs) where adversaries may locate the sink by observing the destination of packets, directing and …
C Huang, M Ma, Y Liu, A Liu - Sensors, 2017 - mdpi.com
Fog (From cOre to edGe) computing employs a huge number of wireless embedded devices to enable end users with anywhere-anytime-to-anything connectivity. Due to their operating …
We address the problem of preventing the inference of contextual information in event- driven wireless sensor networks (WSNs). The problem is considered under a global …
In many scenarios, the locations of monitored targets need to be reported by source nodes, but should remain anonymous in wireless sensor networks. Source-location privacy …
M Dong, K Ota, A Liu - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
A redundant fog loop-based scheme is proposed to preserve the source node-location privacy and achieve energy efficiency through two important mechanisms in wireless sensor …