Related references
Note: Only part of the references are listed.A survey of blockchain applications in sustainable and smart cities
Shanmukha Makani et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2022)
A survey on boosting IoT security and privacy through blockchain Exploration, requirements, and open issues
Omar Alfandi et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2021)
A Survey on Blockchain for Information Systems Management and Security
David Berdik et al.
INFORMATION PROCESSING & MANAGEMENT (2021)
Traffic Analysis Through Spatial and Temporal Correlation: Threat and Countermeasure
Yousef Ebrahimi et al.
IEEE ACCESS (2021)
TCSLP: A trace cost based source location privacy protection scheme in WSNs for smart cities
Hao Wang et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)
Blockchain-based database in an IoT environment: challenges, opportunities, and analysis
Lewis Tseng et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2020)
Revamping data access privacy preservation method against inside attacks in wireless sensor networks
S. Sathees Babu et al.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)
Cross-layer traffic analysis countermeasures against adaptive attackers of wireless sensor networks
Jon R. Ward et al.
WIRELESS NETWORKS (2019)
A survey on location privacy protection in Wireless Sensor Networks
Jinfang Jiang et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)
Differentially Private Location Privacy Preservation in Wireless Sensor Networks
Bodhi Chakraborty et al.
WIRELESS PERSONAL COMMUNICATIONS (2019)
Source-location privacy full protection in wireless sensor networks
Na Wang et al.
INFORMATION SCIENCES (2018)
Hybrid online protocols for source location privacy in wireless sensor networks
Matthew Bradbury et al.
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2018)
SCOUT: a sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks
Saqib Ubaid et al.
JOURNAL OF SUPERCOMPUTING (2018)
A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs
R. Manjula et al.
PERVASIVE AND MOBILE COMPUTING (2018)
Sink location privacy protection under direction attack in wireless sensor networks
Jian Wang et al.
WIRELESS NETWORKS (2017)
Location Privacy in Cognitive Radio Networks: A Survey
Mohamed Grissa et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)
Cross-layer technique for boosting base-station anonymity in wireless sensor networks
Sami Alsemairi et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)
MimiBS: Mimicking Base-Station to Provide Location Privacy Protection in Wireless Sensor Networks
Yawar Abbas Bangash et al.
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY (2017)
All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks
Na Wang et al.
SENSORS (2017)
Preserving Source- and Sink-location Privacy in Sensor Networks
Sangho Lee et al.
COMPUTER SCIENCE AND INFORMATION SYSTEMS (2016)
Sink Location Protection Protocols Based on Packet Sending Rate Adjustment
Juan Chen et al.
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2016)
Increasing base station anonymity using distributed beamforming
Jon R. Ward et al.
AD HOC NETWORKS (2015)
Anti-traffic analysis attack for location privacy in WSNs
Bi Di Ying et al.
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2014)
On providing location privacy for mobile sinks in wireless sensor networks
Edith C. -H. Ngai et al.
WIRELESS NETWORKS (2013)
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
Kiran Mehta et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2012)
A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks
Mohamed M. E. A. Mahmoud et al.
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)
Location Privacy in Unattended Wireless Sensor Networks upon the Requirement of Data Survivability
Chung-Wei Chen et al.
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2011)
Analysis of location privacy solutions in wireless sensor networks
R. Rios et al.
IET COMMUNICATIONS (2011)
Increasing base-station anonymity in wireless sensor networks
Uday Acharya et al.
AD HOC NETWORKS (2010)
Privacy preservation in wireless sensor networks: A state-of-the-art survey
Na Li et al.
AD HOC NETWORKS (2009)
Wireless sensor network survey
Jennifer Yick et al.
COMPUTER NETWORKS (2008)
An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks
Jiejun Kong et al.
IEEE TRANSACTIONS ON MOBILE COMPUTING (2007)