4.8 Article

Position-Independent and Section-Based Source Location Privacy Protection in WSN

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

A Push-Based Probabilistic Method for Source Location Privacy Protection in Underwater Acoustic Sensor Networks

Hao Wang et al.

Summary: This study proposes a push-based probabilistic method for protecting source location privacy in underwater acoustic sensor networks (UASNs). By utilizing fake packet technology and multipath technology to counter passive attacks, and applying the Ekman drift current model and clustering algorithms to improve stability, the proposed scheme achieves a longer safety period with minimal compromise in energy consumption and delay.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Automation & Control Systems

Joint Protection of Energy Security and Information Privacy for Energy Harvesting: An Incentive Federated Learning Approach

Qianqian Pan et al.

Summary: This article proposes a joint protection framework for energy security and information privacy in energy harvesting (EH) systems using an incentive federated learning approach. The framework includes malicious energy user detection, differential privacy-based information preservation, and a noncooperative game-enabled incentive mechanism. Evaluation results demonstrate the effectiveness of the proposed joint protection mechanism.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Automation & Control Systems

Security and Privacy-Enhanced Federated Learning for Anomaly Detection in IoT Infrastructures

Lei Cui et al.

Summary: This article presents a decentralized and asynchronous IoT anomaly detection framework based on blockchain and federated learning. The framework ensures data integrity and prevents single-point failure while improving efficiency. Additionally, an improved differentially private federated learning method based on generative adversarial networks is proposed to optimize data utility. Simulation results demonstrate superior performance in terms of robustness, accuracy, and fast convergence, while maintaining a high level of privacy and security protection.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Information Systems

Protecting Source Location Privacy in IoT-Enabled Wireless Sensor Networks: The Case of Multiple Assets

R. Manjula et al.

Summary: This article proposes two phantom routing-based solutions to provide source location privacy in the case of multisource/asset scenario. The performance improvements of the proposed PRLPRW scheme are evaluated and compared with existing techniques, showing significant enhancements in capture ratio, safety period, and entropy metrics.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

Energy Balanced Source Location Privacy Scheme Using Multibranch Path in WSNs for IoT

Huijiao Wang et al.

Summary: The paper proposes a novel location privacy protection routing scheme called Energy Balanced Branch Tree (EBBT) using multibranch and fake sources. The EBBT scheme achieves a tree-shaped structure from both real and fake source nodes to the base station, providing privacy of the source location while considering network lifetime and security. Experimental results show advantages in network security period, lifetime, and path diversity.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2021)

Article Computer Science, Information Systems

C2S2-LOOP: Circular Chessboard-Based Secure Source Location Privacy Model Using ECC-ALO in WSN

Naveed Jan et al.

Summary: The paper proposes a circular chessboard-based secure source location privacy model ((CS2)-S-2-LOOP) to ensure data security, reduce energy consumption, and latency, utilizing elliptic curve cryptography and ant lion optimization algorithm for key generation. Intercluster routing is achieved through packet traversing in clockwise and anticlockwise directions for secure route establishment. The proposed scheme maintains source node location privacy, decreases energy consumption by more than 40%, and reduces latency by more than 35%, as concluded from network simulations and comparisons with previous approaches.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2021)

Article Computer Science, Theory & Methods

TCSLP: A trace cost based source location privacy protection scheme in WSNs for smart cities

Hao Wang et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Automation & Control Systems

A Dynamic Multipath Scheme for Protecting Source-Location Privacy Using Multiple Sinks in WSNs Intended for IIoT

Guangjie Han et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Engineering, Electrical & Electronic

CPSLP: A Cloud-Based Scheme for Protecting Source Location Privacy in Wireless Sensor Networks Using Multi-Sinks

Guangjie Han et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Theory & Methods

A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things

Yu He et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Engineering, Electrical & Electronic

A Probabilistic Source Location Privacy Protection Scheme in Wireless Sensor Networks

Hao Wang et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Proceedings Paper Telecommunications

A Routing Protocol for Source Location Privacy in Wireless Sensor Networks with Multiple Sources

Asset Berdibek et al.

Q2SWINET'19: PROCEEDINGS OF THE 15TH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS (2019)

Article Engineering, Electrical & Electronic

An Enhanced Source Location Privacy Protection Technique for Wireless Sensor Networks using Randomized Routes

Manjula Raja et al.

IETE JOURNAL OF RESEARCH (2018)

Article Computer Science, Theory & Methods

A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things

Guangjie Han et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Article Computer Science, Information Systems

A novel source location privacy preservation technique to achieve enhanced privacy and network lifetime in WSNs

R. Manjula et al.

PERVASIVE AND MOBILE COMPUTING (2018)

Article Computer Science, Hardware & Architecture

Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks

Jack Kirton et al.

COMPUTER NETWORKS (2018)

Article Engineering, Electrical & Electronic

CASLP: A Confused Arc-Based Source Location Privacy Protection Scheme in WSNs for IoT

Guangjie Han et al.

IEEE COMMUNICATIONS MAGAZINE (2018)

Article Computer Science, Information Systems

On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks

Honglong Chen et al.

PERVASIVE AND MOBILE COMPUTING (2015)

Article Computer Science, Information Systems

An Anti-Tracking Source-Location Privacy Protection Protocol in WSNs Based on Path Extension

Wei Tan et al.

IEEE INTERNET OF THINGS JOURNAL (2014)

Article Computer Science, Information Systems

Providing Source Location Privacy in Wireless Sensor Networks: A Survey

Mauro Conti et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2013)

Article Computer Science, Information Systems

Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks

Jing Deng et al.

PERVASIVE AND MOBILE COMPUTING (2006)

Article Engineering, Electrical & Electronic

An application-specific protocol architecture for wireless microsensor networks

WB Heinzelman et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2002)