Robust Probabilistic Fake Packet Injection for Receiver-Location Privacy in WSN (original) (raw)

Probabilistic receiver-location privacy protection in wireless sensor networks

Ruben Rios

Information Sciences, 2015

View PDFchevron_right

Protecting Receiver-Location Privacy in Wireless Sensor Networks

Ying Jian

2007

View PDFchevron_right

Concealing of the Sink Location in WSNs by artificially homogenizing traffic intensity

Dimitrios Makrakis

2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2011

View PDFchevron_right

Anti-traffic analysis attack for location privacy in WSNs

Dimitrios Makrakis

EURASIP Journal on Wireless Communications and Networking, 2014

View PDFchevron_right

An Evaluation of Location Privacy in Wireless Sensor Networks

IJCSMC Journal

View PDFchevron_right

Source Location Privacy Using Fake Source and Phantom Routing (FSAPR) Technique in Wireless Sensor Networks

Prabhat Kumar

Procedia Computer Science, 2015

View PDFchevron_right

Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources

Arshad Jhumka

2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012

View PDFchevron_right

Using deceptive packets to increase base-station anonymity in wireless sensor network

Mohamed Younis

2011 7th International Wireless Communications and Mobile Computing Conference, 2011

View PDFchevron_right

IRJET-Novel Routing Scheme to conceal Location Privacy in Wireless Sensor Networks

IRJET Journal

IRJET, 2020

View PDFchevron_right

Strategic Location-Based Random Routing for Source Location Privacy in Wireless Sensor Networks

Lilian Mutalemwa

Sensors, 2018

View PDFchevron_right

An enhanced communication protocol for location privacy in WSN

Abdel-Shakour Abuzneid, Miad Faezipour, Tarek Sobh

2015

View PDFchevron_right

Preserving source location privacy in monitoring-based wireless sensor networks

Loren Schwiebert

Parallel and Distributed …, 2006

View PDFchevron_right

Secure Routing Protocols for Source Node Privacy Protection in Multi-Hop Communication Wireless Networks

Lilian Mutalemwa

Energies

View PDFchevron_right

Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks

Javier Miranda López

The Computer Journal, 2011

View PDFchevron_right

IJERT-Securing the Location Privacy in wireless Sensor Networks

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2013

View PDFchevron_right

Compromising Location Privacy inWireless Networks Using Sensors with Limited Information

Riccardo Bettati

27th International Conference on Distributed Computing Systems (ICDCS '07), 2007

View PDFchevron_right

Achieving Source Location Privacy Protection in Monitoring Wireless Sensor Networks through Proxy Node Routing

Lilian Mutalemwa

Sensors, 2019

View PDFchevron_right

Fortified anonymous communication protocol for location privacy in WSN: a modular approach

Abdel-Shakour Abuzneid, Tarek Sobh

2015

View PDFchevron_right

A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks

Sherman Shen

IEEE Transactions on Parallel and Distributed Systems, 2000

View PDFchevron_right

Providing Source and Sink Location Privacy against a Global Eavesdropper in Sensor Networks

Mr. S.N. Shelke

International Journal of Research, 2014

View PDFchevron_right

Preserving Receiver-Location Privacy in Wireless Sensor Networks

Ruben Rios

Lecture Notes in Computer Science, 2014

View PDFchevron_right

Source location anonymity for sensor networks

Alireza Abbasi

2009

View PDFchevron_right

Techniques for Protecting Location Privacy of Source and Sink Node Against Global Adversaries in Sensor Network

Mr. S.N. Shelke

International Journal of Research, 2014

View PDFchevron_right

An enhanced communication protocol for anonymity and location privacy in WSN

Tarek Sobh, Miad Faezipour

2015

View PDFchevron_right

A Novel Approach for Boosting Base Station Anonymity in a WSN

Vicky Kumar

International Journal of Advanced Computer Science and Applications

View PDFchevron_right

Using data mules to preserve source location privacy in Wireless Sensor Networks

Mayank Raja

Pervasive and Mobile Computing, 2014

View PDFchevron_right

Hiding contextual information in WSNs

Alejandro Proaño

2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2012

View PDFchevron_right