Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a phenomenon (motion, temperature, humidity, average, max, min, etc.) and represent what they sense in a form of data. There are many applications for WSNs including object tracking and monitoring where in most of the cases these objects need protection. In these applications, data privacy itself might not be as important as the privacy of source location. In addition to the source location privacy, sink location privacy should also be provided. Providing an efficient end-to-end privacy solution would be a challenging task to achieve due to the open nature of the WSN. The key schemes needed for end-to-end location privacy are anonymity, observabilit...
Various sensor network security schemes care for the content of messages, while the related informat...
AbstractWireless sensor networks (WSNs) consist of numbers of small nodes that can sense, collect, a...
Abstract. Wireless sensor networks (WSNs) have many promising ap-plications for monitoring critical ...
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a pheno...
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a pheno...
Wireless sensor networks (WSNs) consist of many sensors working as hosts. These sensors can sense a ...
Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, whi...
Abstract Anonymous communication systems have been extensively studied by the research community to ...
Wireless Sensor Network (WSN) is infrastructure- less. This is mainly used for target monitoring, ta...
2010-2011 > Academic research: refereed > Refereed conference paperAccepted ManuscriptPublishe
open access articleWireless Sensor Network is a network of large number of nodes with limited power ...
Location privacy measures need to be developed to prevent the opponent from determining the physical...
Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of...
Abstract—K-anonymity has been used to protect location privacy for location monitoring services in w...
Wireless sensor networks (WSNs) have many promising applications for monitoring critical regions, su...
Various sensor network security schemes care for the content of messages, while the related informat...
AbstractWireless sensor networks (WSNs) consist of numbers of small nodes that can sense, collect, a...
Abstract. Wireless sensor networks (WSNs) have many promising ap-plications for monitoring critical ...
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a pheno...
Wireless sensor network (WSN) consists of many hosts called sensors. These sensors can sense a pheno...
Wireless sensor networks (WSNs) consist of many sensors working as hosts. These sensors can sense a ...
Wireless sensor network (WSN) is built of many sensor nodes. The sensors can sense a phenomenon, whi...
Abstract Anonymous communication systems have been extensively studied by the research community to ...
Wireless Sensor Network (WSN) is infrastructure- less. This is mainly used for target monitoring, ta...
2010-2011 > Academic research: refereed > Refereed conference paperAccepted ManuscriptPublishe
open access articleWireless Sensor Network is a network of large number of nodes with limited power ...
Location privacy measures need to be developed to prevent the opponent from determining the physical...
Wireless sensor networks (WSN) are deployed for many applications such as tracking and monitoring of...
Abstract—K-anonymity has been used to protect location privacy for location monitoring services in w...
Wireless sensor networks (WSNs) have many promising applications for monitoring critical regions, su...
Various sensor network security schemes care for the content of messages, while the related informat...
AbstractWireless sensor networks (WSNs) consist of numbers of small nodes that can sense, collect, a...
Abstract. Wireless sensor networks (WSNs) have many promising ap-plications for monitoring critical ...