4.5 Article

Dynamic routing approach for enhancing source location privacy in wireless sensor networks

Related references

Note: Only part of the references are listed.
Proceedings Paper Computer Science, Theory & Methods

From CNNs to Adaptive Filter Design for Digital Image Denoising Using Reinforcement Q-Learning

Muhammad Alolaiwy et al.

Summary: This paper proposes to use reinforcement learning for adaptive filter design of convolutional neural networks, aiming to address the challenges brought by the diversity of noise types in different images. The effectiveness of the proposed method is demonstrated through qualitative and quantitative analysis.

SOUTHEASTCON 2021 (2021)

Article Mathematics, Interdisciplinary Applications

A Smart Privacy-Preserving Learning Method by Fake Gradients to Protect Users Items in Recommender Systems

Guixun Luo et al.

COMPLEXITY (2020)

Article Engineering, Electrical & Electronic

CPSLP: A Cloud-Based Scheme for Protecting Source Location Privacy in Wireless Sensor Networks Using Multi-Sinks

Guangjie Han et al.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2019)

Article Computer Science, Theory & Methods

A sector-based random routing scheme for protecting the source location privacy in WSNs for the Internet of Things

Yu He et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2019)

Article Computer Science, Hardware & Architecture

A source location privacy protection scheme based on ring-loop routing for the IoT

Hao Wang et al.

COMPUTER NETWORKS (2019)

Article Telecommunications

Differentially Private Location Privacy Preservation in Wireless Sensor Networks

Bodhi Chakraborty et al.

WIRELESS PERSONAL COMMUNICATIONS (2019)

Article Computer Science, Software Engineering

Efficient Routing Protocol for Location Privacy Preserving in Internet of Things

Rajwinder Kaur et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY (2019)

Article Computer Science, Information Systems

Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks

Bodhi Chakraborty et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Theory & Methods

A source location protection protocol based on dynamic routing in WSNs for the Social Internet of Things

Guangjie Han et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2018)

Review Engineering, Electrical & Electronic

Trust Mechanisms to Secure Routing in Wireless Sensor Networks: Current State of the Research and Open Research Issues

Farruh Ishmanov et al.

JOURNAL OF SENSORS (2017)

Article Computer Science, Theory & Methods

An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing

Jun Long et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2015)

Proceedings Paper Computer Science, Theory & Methods

Source Location Privacy Using Fake Source And Phantom Routing (FSAPR) Technique in Wireless Sensor Networks

Pradeep Kumar Roy et al.

3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015) (2015)

Article Computer Science, Information Systems

On mitigating hotspots to maximize network lifetime in multi-hop wireless sensor network with guaranteed transport delay and reliability

Anfeng Liu et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2014)

Article Computer Science, Information Systems

Privacy preserving shortest path routing with an application to navigation

Yong Xi et al.

PERVASIVE AND MOBILE COMPUTING (2014)

Article Computer Science, Information Systems

Using data mules to preserve source location privacy in Wireless Sensor Networks

Mayank Raj et al.

PERVASIVE AND MOBILE COMPUTING (2014)

Proceedings Paper Computer Science, Artificial Intelligence

Enhancing Source Location Privacy in Energy-Constrained Wireless Sensor Networks

Guangbao Tan et al.

PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSAIT 2013) (2014)

Article Computer Science, Information Systems

An Energy-Efficient Cyclic Diversionary Routing Strategy against Global Eavesdroppers in Wireless Sensor Networks

Ju Ren et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2013)

Article Computer Science, Information Systems

Protecting Location Privacy in Sensor Networks against a Global Eavesdropper

Kiran Mehta et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2012)

Article Computer Science, Theory & Methods

Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks

Yun Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2012)

Article Computer Science, Information Systems

An efficient anonymous communication protocol for wireless sensor networks

Juan Chen et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2012)

Article Computer Science, Hardware & Architecture

On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy

Arshad Jhumka et al.

COMPUTER JOURNAL (2011)

Article Computer Science, Hardware & Architecture

Privacy-aware routing in sensor networks

Haodong Wang et al.

COMPUTER NETWORKS (2009)