Wireless Sensor Networks (WSNs) are often deployed in hostile environments to detect and collect interested events such as the appearance of a rare animal, which is called event collection system. However, due to the open characteristic of wireless communications, an adversary can detect the location of a source or sink and eventually capture them by eavesdropping on the sensor nodes' transmissions and tracing the packets' trajectories in the networks. Thus the location privacy of both the source and sink becomes a critical issue in WSNs. Previous research only focuses on the location privacy of the source or sink independently. In this paper, we address the importance of location privacy of both the source and sink and propose four schemes...
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a pheno...
This thesis deals with securing the source location in Wireless Sensor Networks (WSNs). Sensor sourc...
Wireless Sensor Network (WSN) is infrastructure- less. This is mainly used for target monitoring, ta...
2010-2011 > Academic research: refereed > Refereed conference paperAccepted ManuscriptPublishe
Privacy is one of the major concerns in dealing with information, either transmission or storage. Th...
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a pheno...
With a increased area of the applications of WSN, the security mechanisms are rising issue of outmos...
Abstract—While many protocols for sensor network security provide confidentiality for the content of...
Abstract: In wireless sensor network monitored objects can be located by using traffic analysis tech...
Various sensor network security schemes care for the content of messages, while the related informat...
Location privacy measures need to be developed to prevent the opponent from determining the physical...
Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, whi...
Abstract—Due to the open nature of a sensor network, it is relatively easy for an adversary to eaves...
Wireless sensor networks (WSNs) have many promising applications for monitoring critical regions, su...
Wireless sensor networks (WSNs) consist of many sensors working as hosts. These sensors can sense a ...
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a pheno...
This thesis deals with securing the source location in Wireless Sensor Networks (WSNs). Sensor sourc...
Wireless Sensor Network (WSN) is infrastructure- less. This is mainly used for target monitoring, ta...
2010-2011 > Academic research: refereed > Refereed conference paperAccepted ManuscriptPublishe
Privacy is one of the major concerns in dealing with information, either transmission or storage. Th...
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a pheno...
With a increased area of the applications of WSN, the security mechanisms are rising issue of outmos...
Abstract—While many protocols for sensor network security provide confidentiality for the content of...
Abstract: In wireless sensor network monitored objects can be located by using traffic analysis tech...
Various sensor network security schemes care for the content of messages, while the related informat...
Location privacy measures need to be developed to prevent the opponent from determining the physical...
Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, whi...
Abstract—Due to the open nature of a sensor network, it is relatively easy for an adversary to eaves...
Wireless sensor networks (WSNs) have many promising applications for monitoring critical regions, su...
Wireless sensor networks (WSNs) consist of many sensors working as hosts. These sensors can sense a ...
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a pheno...
This thesis deals with securing the source location in Wireless Sensor Networks (WSNs). Sensor sourc...
Wireless Sensor Network (WSN) is infrastructure- less. This is mainly used for target monitoring, ta...