Providing Source Location Privacy in Wireless Sensor Networks: A Survey
Published 2013 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Providing Source Location Privacy in Wireless Sensor Networks: A Survey
Authors
Keywords
-
Journal
IEEE Communications Surveys and Tutorials
Volume 15, Issue 3, Pages 1238-1280
Publisher
Institute of Electrical and Electronics Engineers (IEEE)
Online
2013-01-29
DOI
10.1109/surv.2013.011413.00118
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Network coding and competitive approach for gradient based routing in wireless sensor networks
- (2012) Lusheng Miao et al. Ad Hoc Networks
- Using a dynamic backbone for efficient data delivery in solar-powered WSNs
- (2012) Dong Kun Noh et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A security framework for privacy-preserving data aggregation in wireless sensor networks
- (2011) Aldar C-F. Chan et al. ACM Transactions on Sensor Networks
- On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy
- (2011) A. Jhumka et al. COMPUTER JOURNAL
- Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks
- (2011) R. Rios et al. COMPUTER JOURNAL
- Opportunistic routing – A review and the challenges ahead
- (2011) Che-Jung Hsu et al. Computer Networks
- Integrity protecting hierarchical concealed data aggregation for wireless sensor networks
- (2011) Suat Ozdemir et al. Computer Networks
- Maximizing lifetime of event-unobservable wireless sensor networks
- (2011) Kemal Bicakci et al. COMPUTER STANDARDS & INTERFACES
- Lifetime Bounds of Wireless Sensor Networks Preserving Perfect Sink Unobservability
- (2011) Kemal Bicakci et al. IEEE COMMUNICATIONS LETTERS
- Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
- (2011) K. Mehta et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- A Cloud-Based Scheme for Protecting Source-Location Privacy against Hotspot-Locating Attack in Wireless Sensor Networks
- (2011) Mohamed M.E.A. Mahmoud et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A privacy-aware overlay routing scheme in WSNs
- (2011) L. Kazatzopoulos et al. Security and Communication Networks
- An efficient anonymous communication protocol for wireless sensor networks
- (2011) Juan Chen et al. WIRELESS COMMUNICATIONS & MOBILE COMPUTING
- Design and performance analysis of MAC schemes for Wireless Sensor Networks Powered by Ambient Energy Harvesting
- (2010) Zhi Ang Eu et al. Ad Hoc Networks
- Location privacy and resilience in wireless sensor networks querying
- (2010) Roberto Di Pietro et al. COMPUTER COMMUNICATIONS
- Data obfuscation with network coding
- (2010) A. Hessler et al. COMPUTER COMMUNICATIONS
- Mitigation of Compromising Privacy by Transmission Range Control in Wireless Sensor Networks
- (2010) Bulent Tavli et al. IEEE COMMUNICATIONS LETTERS
- Random-walk based approach to detect clone attacks in wireless sensor networks
- (2010) Yingpei Zeng et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
- (2010) Chi-Yin Chow et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks
- (2010) Yanfei Fan et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks
- (2010) Yanjiang Yang et al. Security and Communication Networks
- Secure real-time routing protocol with load distribution in wireless sensor networks
- (2010) Adel Ali Ahmed et al. Security and Communication Networks
- Achieving Network Level Privacy in Wireless Sensor Networks
- (2010) Riaz Ahmed Shaikh et al. SENSORS
- Temporal privacy in wireless sensor networks
- (2009) Pandurang Kamat et al. ACM Transactions on Sensor Networks
- Rethinking security properties, threat models, and the design space in sensor networks: A case study in SCADA systems
- (2009) Alvaro A. Cardenas et al. Ad Hoc Networks
- Privacy preservation in wireless sensor networks: A state-of-the-art survey
- (2009) Na Li et al. Ad Hoc Networks
- Privacy-aware routing in sensor networks
- (2009) Haodong Wang et al. Computer Networks
- Sensor network security: a survey
- (2009) Xiangqian Chen et al. IEEE Communications Surveys and Tutorials
- Wireless Location Privacy Protection in Vehicular Ad-Hoc Networks
- (2009) Joo-Han Song et al. MOBILE NETWORKS & APPLICATIONS
- Confidentiality and integrity for data aggregation in WSN using peer monitoring
- (2009) Roberto Di Pietro et al. Security and Communication Networks
- Privacy-preserving robust data aggregation in wireless sensor networks
- (2009) Mauro Conti et al. Security and Communication Networks
- SDAP
- (2008) Yi Yang et al. ACM Transactions on Information and System Security
- Location privacy and anonymity preserving routing for wireless sensor networks
- (2008) Alireza A. Nezhad et al. Computer Networks
- Transactional Confidentiality in Sensor Networks
- (2008) Sameer Pai et al. IEEE SECURITY & PRIVACY
- A Survey on the Encryption of Convergecast Traffic with In-Network Processing
- (2008) S. Peter et al. IEEE Transactions on Dependable and Secure Computing
- Cross-layer optimization for energy-efficient wireless communications: a survey
- (2008) Guowang Miao et al. WIRELESS COMMUNICATIONS & MOBILE COMPUTING
- Secure probabilistic location verification in randomly deployed wireless sensor networks
- (2007) E. Ekici et al. Ad Hoc Networks
- Security and Privacy for Distributed Multimedia Sensor Networks
- (2007) D. Kundur et al. PROCEEDINGS OF THE IEEE
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreBecome a Peeref-certified reviewer
The Peeref Institute provides free reviewer training that teaches the core competencies of the academic peer review process.
Get Started