Providing source location privacy in wireless sensor networks: A survey

M Conti, J Willemsen, B Crispo - … Communications Surveys & …, 2013 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) consist of numerous small nodes that can sense, collect,
and disseminate information for many different types of applications. One of these …

A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks

MMEA Mahmoud, X Shen - IEEE Transactions on Parallel and …, 2011 - ieeexplore.ieee.org
In wireless sensor networks, adversaries can make use of the traffic information to locate the
monitored objects, eg, to hunt endangered animals or kill soldiers. In this paper, we first …

Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks

J Long, M Dong, K Ota, A Liu - IEEE Access, 2014 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) have been proliferating due to their wide applications in
both military and commercial use. However, one critical challenge to WSNs implementation …

Privacy-preserving data aggregation in mobile phone sensing

Y Zhang, Q Chen, S Zhong - IEEE Transactions on Information …, 2016 - ieeexplore.ieee.org
Mobile phone sensing provides a promising paradigm for collecting sensing data and has
been receiving increasing attention in recent years. Different from most existing works, which …

Source-location privacy protection based on anonymity cloud in wireless sensor networks

N Wang, J Fu, J Li, BK Bhargava - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
An adversary can deploy parasitic sensor nodes into wireless sensor networks to collect
radio traffic distributions and trace back messages to their source nodes. Then, he can …

An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing

J Long, A Liu, M Dong, Z Li - Journal of parallel and Distributed computing, 2015 - Elsevier
Sink location privacy is one of the major issues in Wireless Sensor Networks (WSNs) where
adversaries may locate the sink by observing the destination of packets, directing and …

[HTML][HTML] Preserving source location privacy for energy harvesting WSNs

C Huang, M Ma, Y Liu, A Liu - Sensors, 2017 - mdpi.com
Fog (From cOre to edGe) computing employs a huge number of wireless embedded devices
to enable end users with anywhere-anytime-to-anything connectivity. Due to their operating …

Traffic decorrelation techniques for countering a global eavesdropper in WSNs

A Proano, L Lazos, M Krunz - IEEE Transactions on Mobile …, 2016 - ieeexplore.ieee.org
We address the problem of preventing the inference of contextual information in event-
driven wireless sensor networks (WSNs). The problem is considered under a global …

Source-location privacy full protection in wireless sensor networks

N Wang, J Fu, J Zeng, BK Bhargava - Information Sciences, 2018 - Elsevier
In many scenarios, the locations of monitored targets need to be reported by source nodes,
but should remain anonymous in wireless sensor networks. Source-location privacy …

Preserving source-location privacy through redundant fog loop for wireless sensor networks

M Dong, K Ota, A Liu - 2015 IEEE International Conference on …, 2015 - ieeexplore.ieee.org
A redundant fog loop-based scheme is proposed to preserve the source node-location
privacy and achieve energy efficiency through two important mechanisms in wireless sensor …