Dynamic routing approach for enhancing source location privacy in wireless sensor networks
In real-time and mission-critical applications of wireless sensor networks (WSNs), such as
military, the location of monitored objects must only be informed by sensor nodes to the base …
military, the location of monitored objects must only be informed by sensor nodes to the base …
Enhancing Data Privacy In Wireless Sensor Networks: Investigating Techniques And Protocols To Protect Privacy Of Data Transmitted Over Wireless Sensor Networks …
The article discusses the emergence of Wireless Sensor Networks (WSNs) as a
groundbreaking technology in data processing and communication. It outlines how WSNs …
groundbreaking technology in data processing and communication. It outlines how WSNs …
A push-based probabilistic method for source location privacy protection in underwater acoustic sensor networks
As the research topics in ocean emerge, underwater acoustic sensor networks (UASNs)
have become ever more relevant. Consequently, challenges arise with the security and …
have become ever more relevant. Consequently, challenges arise with the security and …
Enhancing data privacy in wireless sensor networks: investigating techniques and protocols to protect privacy of data transmitted over wireless sensor networks in …
A Akinsola, TK Njoku, O Ejiofor… - International Journal of …, 2024 - papers.ssrn.com
The article discusses the emergence of Wireless Sensor Networks (WSNs) as a
groundbreaking technology in data processing and communication. It outlines how WSNs …
groundbreaking technology in data processing and communication. It outlines how WSNs …
Secure routing protocols for source node privacy protection in multi-hop communication wireless networks
Traffic analysis attacks are common in monitoring wireless sensor networks (WSNs). In the
attacks, adversaries analyze the traffic pattern to obtain critical information such as the …
attacks, adversaries analyze the traffic pattern to obtain critical information such as the …
Routing technique in location source privacy for wireless sensor network: A review
In a wireless sensor network context, a wireless sensor network (WSN) is a collection of
sensor nodes made up of small nodes with minimal energy resources and powered solely …
sensor nodes made up of small nodes with minimal energy resources and powered solely …
Energy‐efficient source location privacy protection for network lifetime maximization against local eavesdropper in wireless sensor network (EeSP)
Wireless sensor networks can be deployed in harsh environments for monitoring purposes.
In such environments where there is a lack of human presence, the network may face severe …
In such environments where there is a lack of human presence, the network may face severe …
Novel approaches to realize the reliability of location privacy protocols in monitoring wireless networks
Wireless sensor network (WSN) technology presents significant advantages for Internet of
Things (IoT). Sensor-based IoT networks are designed to operate in unattended, harsh, and …
Things (IoT). Sensor-based IoT networks are designed to operate in unattended, harsh, and …
Comprehensive performance analysis of privacy protection protocols utilizing fake packet injection techniques
In many Internet of Things (IoT) systems and monitoring wireless sensor networks (WSNs),
sensor nodes are expected to function for prolonged periods of time with no scope of …
sensor nodes are expected to function for prolonged periods of time with no scope of …