Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Achieving source location privacy and network lifetime maximization through tree-based diversionary routing in wireless sensor networks
Wireless sensor networks (WSNs) have been proliferating due to their wide applications in
both military and commercial use. However, one critical challenge to WSNs implementation …
both military and commercial use. However, one critical challenge to WSNs implementation …
Trust management and reputation systems in mobile participatory sensing applications: A survey
Participatory sensing is an emerging paradigm in which citizens everywhere voluntarily use
their computational devices to capture and share sensed data from their surrounding …
their computational devices to capture and share sensed data from their surrounding …
Privacy preserving using multi-hop dynamic clustering routing protocol and elliptic curve cryptosystem for WSN in IoT environment
V Kavitha - Peer-to-Peer Networking and Applications, 2021 - Springer
Abstract Wireless Sensor Networks (WSN) are naturally resource-constrained and have
been deployed in various applications such as home monitoring, health care monitoring and …
been deployed in various applications such as home monitoring, health care monitoring and …
Achieving source location privacy protection in monitoring wireless sensor networks through proxy node routing
Achieving high source location privacy is critical when Wireless Sensor Networks (WSNs)
are used in sensitive applications such as in asset or battlefield monitoring. Due to the …
are used in sensitive applications such as in asset or battlefield monitoring. Due to the …
In-network trajectory privacy preservation
Recent advances in mobile device, wireless networking, and positional technologies have
helped location-aware applications become pervasive. However, location trajectory privacy …
helped location-aware applications become pervasive. However, location trajectory privacy …
Hybrid online protocols for source location privacy in wireless sensor networks
Wireless sensor networks (WSNs) will form the building blocks of many novel applications
such as asset monitoring. These applications will have to guarantee that the location of the …
such as asset monitoring. These applications will have to guarantee that the location of the …
Attacker location evaluation-based fake source scheduling for source location privacy in cyber-physical systems
Cyber-physical systems (CPS) have been deployed in many areas and have reached
unprecedented levels of performance and efficiency. However, the security and privacy …
unprecedented levels of performance and efficiency. However, the security and privacy …
Secure routing protocols for source node privacy protection in multi-hop communication wireless networks
Traffic analysis attacks are common in monitoring wireless sensor networks (WSNs). In the
attacks, adversaries analyze the traffic pattern to obtain critical information such as the …
attacks, adversaries analyze the traffic pattern to obtain critical information such as the …
TCSLP: A trace cost based source location privacy protection scheme in WSNs for smart cities
Abstract In recent years, Wireless Sensor Networks (WSNs) have played an important role in
smart cities, which are a hot spot. More attentions have been paid to the security in smart …
smart cities, which are a hot spot. More attentions have been paid to the security in smart …
A source location privacy preservation scheme in WSN-assisted IoT network by randomized ring and confounding transmission
Wireless sensor network (WSN) based applications have become regular in our daily lives,
and their integration with the Internet of Things (IoT) makes them even more productive and …
and their integration with the Internet of Things (IoT) makes them even more productive and …