4.6 Article

A multi-illusive voids approach for increasing base station anonymity

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

A survey of blockchain applications in sustainable and smart cities

Shanmukha Makani et al.

Summary: This article discusses the concept of smart cities and the application of blockchain technology in smart cities. The decentralized, transparent, democratic, secure, and immutable nature of blockchain technology provides smart cities with more reliable, transparent, secure, and democratized services and applications. The article also explores the various domains in which blockchain technology can be applied in smart cities.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2022)

Article Computer Science, Information Systems

A survey on boosting IoT security and privacy through blockchain Exploration, requirements, and open issues

Omar Alfandi et al.

Summary: The paper comprehensively reviews recent security and privacy challenges related to IoT, categorizing them according to the IoT layered architecture: perception, network, and application layer. The study investigates blockchain technology as a key pillar to overcome many of the IoT security and privacy problems, while also exploring the added value of combining blockchain with other new technologies such as machine learning, especially in intrusion detection systems. Additionally, challenges and privacy issues resulting from the integration of blockchain in IoT applications are highlighted, and a framework of IoT security and privacy requirements via blockchain technology is proposed.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2021)

Article Computer Science, Information Systems

A Survey on Blockchain for Information Systems Management and Security

David Berdik et al.

Summary: Blockchain technology has vast potential applications across different sectors, yet its complexity and purpose remain challenging. Research shows how blockchain can help secure and manage information systems, and the impact of various studies and applications on the blockchain. The study emphasizes the importance of blockchain's structure and modern computing paradigms in its market development, and highlights the significance of ensuring its widespread availability for further technological advancements.

INFORMATION PROCESSING & MANAGEMENT (2021)

Article Computer Science, Information Systems

Traffic Analysis Through Spatial and Temporal Correlation: Threat and Countermeasure

Yousef Ebrahimi et al.

Summary: The base station is a crucial target for attacks in Wireless Sensor Networks. A study introduces an enhanced version of Evidence theory (ET) that utilizes temporal correlation of transmissions to gain further insight about network topology, as well as a countermeasure called Assisted Deception (AD) that is resilient to ET and its enhanced version.

IEEE ACCESS (2021)

Article Computer Science, Theory & Methods

TCSLP: A trace cost based source location privacy protection scheme in WSNs for smart cities

Hao Wang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

Blockchain-based database in an IoT environment: challenges, opportunities, and analysis

Lewis Tseng et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2020)

Article Computer Science, Information Systems

Revamping data access privacy preservation method against inside attacks in wireless sensor networks

S. Sathees Babu et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Cross-layer traffic analysis countermeasures against adaptive attackers of wireless sensor networks

Jon R. Ward et al.

WIRELESS NETWORKS (2019)

Review Computer Science, Hardware & Architecture

A survey on location privacy protection in Wireless Sensor Networks

Jinfang Jiang et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Telecommunications

Differentially Private Location Privacy Preservation in Wireless Sensor Networks

Bodhi Chakraborty et al.

WIRELESS PERSONAL COMMUNICATIONS (2019)

Article Computer Science, Information Systems

Source-location privacy full protection in wireless sensor networks

Na Wang et al.

INFORMATION SCIENCES (2018)

Article Computer Science, Theory & Methods

Hybrid online protocols for source location privacy in wireless sensor networks

Matthew Bradbury et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2018)

Article Computer Science, Information Systems

A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs

R. Manjula et al.

PERVASIVE AND MOBILE COMPUTING (2018)

Article Computer Science, Information Systems

Sink location privacy protection under direction attack in wireless sensor networks

Jian Wang et al.

WIRELESS NETWORKS (2017)

Article Computer Science, Information Systems

Location Privacy in Cognitive Radio Networks: A Survey

Mohamed Grissa et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2017)

Article Engineering, Electrical & Electronic

Cross-layer technique for boosting base-station anonymity in wireless sensor networks

Sami Alsemairi et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2017)

Article Computer Science, Hardware & Architecture

MimiBS: Mimicking Base-Station to Provide Location Privacy Protection in Wireless Sensor Networks

Yawar Abbas Bangash et al.

JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY (2017)

Article Computer Science, Information Systems

Preserving Source- and Sink-location Privacy in Sensor Networks

Sangho Lee et al.

COMPUTER SCIENCE AND INFORMATION SYSTEMS (2016)

Article Computer Science, Information Systems

Sink Location Protection Protocols Based on Packet Sending Rate Adjustment

Juan Chen et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2016)

Article Computer Science, Information Systems

Increasing base station anonymity using distributed beamforming

Jon R. Ward et al.

AD HOC NETWORKS (2015)

Article Engineering, Electrical & Electronic

Anti-traffic analysis attack for location privacy in WSNs

Bi Di Ying et al.

EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING (2014)

Article Computer Science, Information Systems

On providing location privacy for mobile sinks in wireless sensor networks

Edith C. -H. Ngai et al.

WIRELESS NETWORKS (2013)

Article Computer Science, Information Systems

Protecting Location Privacy in Sensor Networks against a Global Eavesdropper

Kiran Mehta et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2012)

Article Computer Science, Theory & Methods

A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks

Mohamed M. E. A. Mahmoud et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Article Engineering, Electrical & Electronic

Location Privacy in Unattended Wireless Sensor Networks upon the Requirement of Data Survivability

Chung-Wei Chen et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2011)

Article Engineering, Electrical & Electronic

Analysis of location privacy solutions in wireless sensor networks

R. Rios et al.

IET COMMUNICATIONS (2011)

Article Computer Science, Information Systems

Increasing base-station anonymity in wireless sensor networks

Uday Acharya et al.

AD HOC NETWORKS (2010)

Article Computer Science, Information Systems

Privacy preservation in wireless sensor networks: A state-of-the-art survey

Na Li et al.

AD HOC NETWORKS (2009)

Review Computer Science, Hardware & Architecture

Wireless sensor network survey

Jennifer Yick et al.

COMPUTER NETWORKS (2008)

Article Computer Science, Information Systems

An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks

Jiejun Kong et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2007)