Privacy-preserving content dissemination for vehicular social networks: Challenges and solutions

X Wang, Z Ning, MC Zhou, X Hu… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Vehicular social networks (VSNs), viewed as the integration of traditional vehicular networks
and social networks, are promising communication platforms based on the development of …

A range-based secure localization algorithm for wireless sensor networks

X Liu, S Su, F Han, Y Liu, Z Pan - IEEE Sensors Journal, 2018 - ieeexplore.ieee.org
The accurate localization of nodes in wireless sensor networks can be jeopardized in certain
applications of fields, such as those in security and military. In order to detect the nodes that …

Secure location of things (SLOT): Mitigating localization spoofing attacks in the Internet of Things

P Zhang, SG Nagarajan, I Nevat - IEEE Internet of Things …, 2017 - ieeexplore.ieee.org
The rise of geo-spatial location-based applications for the Internet of Things introduces new
location spoofing security risks. To overcome the threat of malicious spoofing attacks, we …

Geo-spatial location spoofing detection for Internet of Things

JY Koh, I Nevat, D Leong… - IEEE Internet of Things …, 2016 - ieeexplore.ieee.org
We develop a new location spoofing detection algorithm for geo-spatial tagging and location-
based services in the Internet of Things (IoT), called enhanced location spoofing detection …

TRAST: Trust-based distributed topology management for wireless multimedia sensor networks

G Mali, S Misra - IEEE Transactions on Computers, 2015 - ieeexplore.ieee.org
A distributed topology management scheme in wireless multimedia sensor networks
(WMSNs) ensures coverage of an event, prolongs network lifetime, and maintains …

A non-cooperative non-zero-sum game-based dependability assessment of heterogeneous WSNs with malware diffusion

S Shen, H Ma, E Fan, K Hu, S Yu, J Liu… - Journal of Network and …, 2017 - Elsevier
Abstract We consider Heterogeneous Wireless Sensor Networks (HWSNs) with malware
diffusion and find a solution to assess their dependability in order to guarantee dependable …

Lightweight secure localization approach in wireless sensor networks

N **e, Y Chen, Z Li, DO Wu - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
This paper is concerned with the security problem of Time of Arrival (ToA) based localization
schemes in a wireless sensor network (WSN) with multiple attackers and this paper focuses …

Towards security joint trust and game theory for maximizing utility: challenges and countermeasures

L Huang, G Jia, W Fang, W Chen, W Zhang - Sensors, 2019 - mdpi.com
The widespread application of networks is providing a better platform for the development of
society and technology. With the expansion of the scope of network applications, many …

Reliability evaluation for clustered WSNs under malware propagation

S Shen, L Huang, J Liu, AC Champion, S Yu, Q Cao - Sensors, 2016 - mdpi.com
We consider a clustered wireless sensor network (WSN) under epidemic-malware
propagation conditions and solve the problem of how to evaluate its reliability so as to …

Modeling IoT-based solutions using human-centric wireless sensor networks

Á Monares, SF Ochoa, R Santos, J Orozco… - Sensors, 2014 - mdpi.com
The Internet of Things (IoT) has inspired solutions that are already available for addressing
problems in various application scenarios, such as healthcare, security, emergency support …