Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








2,434 Hits in 2.8 sec

Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks

Jing Yang Koh, Derek Leong, Gareth W. Peters, Ido Nevat, Wai-Choong Wong
2017 IEEE Transactions on Information Forensics and Security  
In this paper, we explicitly examine the privacy-utility trade-off problem for wireless networks and develop a novel privacy-preserving routing algorithm called Optimal Privacy Enhancing Routing Algorithm  ...  Privacy-preserving routing protocols in wireless networks frequently utilize additional artificial traffic to hide the source-destination identities of the communicating pair.  ...  Peters, Ido Nevat, and Wai-Choong Wong 1 Optimal Privacy-Preserving Probabilistic Routing for Wireless Networks TABLE I NOTATION I G connected hypergraph representing the network.  ... 
doi:10.1109/tifs.2017.2698424 fatcat:63njeikpevesxlrus6ce2yfepq

Finding Optimal Path and Privacy Preserving for Wireless Network

Manasi Kiranagi, Devika Dhoble, Madeeha Tahoor, Dr. Rekha Patil
2022 International Journal for Research in Applied Science and Engineering Technology  
We explicitly examine the privacyutility trade-off problem for wireless networks and develop a novel privacy-preserving routing algorithm called Optimal Privacy Enhancing Routing Algorithm (OPERA).  ...  Abstract: Privacy-preserving routing protocols in wireless networks frequently utilize additional artificial traffic to hide the source-destination identities of the communicating pair.  ...  Optimized Probabilistic Routing: We focus on protecting the privacy of the source-destination identities by designing a probabilistic privacy-preserving routing protocol to minimize the probability of  ... 
doi:10.22214/ijraset.2022.46949 fatcat:43mprab6sraollyoy6n3dox26u

Author index

2013 38th Annual IEEE Conference on Local Computer Networks  
M2M Infrastructure Towards a Simple, Versatile, Distributed Low-Power Wireless M2M Infrastructure Eckhoff, David SmartRevoc: An Efficient and Privacy Preserving Revocation System Using Parked Vehicles  ...  Status Monitoring in Sensor Networks Using Adaptive Piggybacking Faster Distributed Localization of Large Numbers of Nodes Using Clustering SmartRevoc: An Efficient and Privacy Preserving Revocation  ... 
doi:10.1109/lcn.2013.6761235 fatcat:lcoo2auxgjeirmddevnhp5henq

Performance Analysis of various Schemes for Source-Location Privacy Preserving Wireless Sensor Networks

2022 TAGA Journal  
Wireless Sensor Network (WSN) is a recognized environment used in many applications that require monitoring events.  ...  Privacy has become an essential issue in finding a solution for deploying the environment of WSN.  ...  Privacy preservation data aggregation schemes are also shown that enhances the efficiency of wireless sensor network (WSN).  ... 
doi:10.37896/pd91.4/91473 fatcat:kiybhhqftnfi7g4ef7tk5z2zrq

2014 Index IEEE Transactions on Parallel and Distributed Systems Vol. 25

2015 IEEE Transactions on Parallel and Distributed Systems  
Huang, X., +, TPDS July 2014 1767- 1775 Lightweight Privacy-Preserving and Secure Communication Protocol for Hybrid Ad Hoc Wireless Networks. Mahmoud, M. M. E.  ...  ., +, TPDS Nov. 2014 3025-3035 Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks.  ...  Psaras, I., +, TPDS Nov. 2014 2920 -2931 Max-Min Lifetime Optimization for Cooperative Communications in Multi-Channel Wireless Networks.  ... 
doi:10.1109/tpds.2014.2371591 fatcat:qxyljogalrbfficryqjowgv3je

Residual Energy Based Anti-Traffic Analysis Privacy Preservation in WSN

Manjusha Pandey, Shekhar Verma
2012 International Journal of Computer Network and Information Security  
Hence the problem undertaken in the current research effort is to optimize the energy consumption at the node level for fake packet generation.  ...  Present paper is an effort to build an energy efficient mechanism which can preserve the privacy of the location of base station and the source nodes so that the adversary cannot take down these nodes.  ...  This is an effort to make the anti traffic analysis privacy preservation in wireless sensor networks energy efficient and thus leading towards the network lifetime optimization.  ... 
doi:10.5815/ijcnis.2012.04.03 fatcat:zsdcojgjtrbdpmnseax4x4wdxe

Recent Advances in Security and Privacy for Wireless Sensor Networks 2016

Fei Yu, Chin-Chen Chang, Jian Shu, Iftikhar Ahmad, Jun Zhang, Jose Maria de Fuentes
2017 Journal of Sensors  
The special issue covers industrial issues/applications and academic research into security and privacy for wireless sensor networks.  ...  In this special issue, we concentrate mainly on security and privacy as well as the emerging applications of wireless sensor network.  ...  We wish to express our deepest thanks to the program committee members for their help in selecting papers for this issue and especially the referees of the extended versions of the selected papers for  ... 
doi:10.1155/2017/3057534 fatcat:y2x5fqe7lbhyfh5fo3lha63w2e

Table of contents

2021 IEEE Internet of Things Journal  
Zhang 4579 Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks .  ...  Henry 4868 Delay-Aware Green Routing for Mobile-Sink-Based Wireless Sensor Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/jiot.2021.3060607 fatcat:veucgc5syvbijd5vcgt5dvhb3m

Special issue on vehicles as sensing devices: from observations to actionable insights

Chao Chen, Flora Salim, Luis Moreira-Matias, Sha Zhao
2021 Journal of Ambient Intelligence and Humanized Computing  
Acknowledgements We would like to thank all the authors for their contributions and efforts in the preparation of manuscripts.  ...  We also want to show our deepest gratitude to all the invited reviewers for their valuable help in improving the quality of published papers in this special issue.  ...  Authors proposed a novel differential privacy based probabilistic mechanism to generate the privacy preserved population distributions from mobility datasets.  ... 
doi:10.1007/s12652-021-02916-4 fatcat:6toovz24tba2xmbswrrnbcvzoq

Mobile Sensing and Actuating with Ubiquitous Computing

Mo Li, Yunhao Liu, Xiang-Yang Li
2012 International Journal of Distributed Sensor Networks  
The paper "Dynamic key-updating: privacy-preserving authentication for RFID systems" proposes a strong and lightweight RFID private authentication protocol, SPA.  ...  The paper "An energy-efficient CKN algorithm for dutycycled wireless sensor networks" investigates the unexplored energy consumption of the CKN algorithm. By building  ...  The paper "Dynamic key-updating: privacy-preserving authentication for RFID systems" proposes a strong and lightweight RFID private authentication protocol, SPA.  ... 
doi:10.1155/2012/296396 fatcat:gh6bijmahjhztcxlf6rmd2o5fa

Privacy Enhancing Technologies for Wireless Sensor Networks [chapter]

Chi-Yin Chow, Wenjian Xu, Tian He
2013 Signals and Communication Technology  
In this chapter, we discuss existing privacy enhancing technologies designed for protecting system privacy, data privacy and context privacy in wireless sensor networks (WSNs).  ...  Since wireless sensor networks (WSNs) are vulnerable to malicious attacks due to their characteristics, privacy is a critical issue in many WSN applications.  ...  Fig. 16 16 Probabilistic Privacy Enhancing Technologies for Wireless Sensor Networks  ... 
doi:10.1007/978-3-642-40009-4_18 fatcat:acvd2cqeojazrk74x7jllyvpj4

Energy Efficient Source Location Privacy Protecting Scheme in Wireless Sensor Networks Using Ant Colony Optimization

Liming Zhou, Qiaoyan Wen
2014 International Journal of Distributed Sensor Networks  
Ant colony optimization provides a natural and intrinsic way of exploration of search space for preserving sensor's location privacy.  ...  And we propose an energy efficient preserving sensor's location privacy based on ant colony optimization scheme, which is a flexible routing strategy to protect the sensor's location.  ...  In this paper, we preserve sensor location information and prolong the network lifetime in wireless sensor networks.  ... 
doi:10.1155/2014/920510 fatcat:dpesihobojb7pbrpswuhidu2em

Machine learning algorithms for privacy preserving in vehicular ad hoc network

Shazia Sulthana, Byppanahalli Narayana Reddy Manjunatha Reddy
2023 Indonesian Journal of Electrical Engineering and Computer Science  
artificial neural networks (ANN), Bayesian network (BN) methods are utilized in correlation with the proposed deep neural networks (DNN) with the black widow optimization (BWO) for protection preserving  ...  This work is to present an estimation and assessment of machine learning techniques for achieving privacy preservation in vehicular ad hoc networks (VANETs).  ...  (DNN) with the black widow optimization (BWO) for privacy-preserving.  ... 
doi:10.11591/ijeecs.v30.i2.pp1021-1028 fatcat:f2qetoz4ajdhzj6i7gd6godauy

Guest Editorial Software Defined Internet of Vehicles

Zhihan Lv, Jaime Lloret, Houbing Song
2021 IEEE transactions on intelligent transportation systems (Print)  
These large amounts of vehicle information can be analyzed and processed through computer technology to calculate the optimal route for different vehicles, and report road conditions in time and schedule  ...  Internet of Vehicles (IoV) is a large-scale system network for wireless communication and information exchange between vehicles and people, vehicles and roads, vehicles and the Internet, which is based  ...  "Blockchain-based Trust Management Model for Location Privacy Preserving in VANET" proposes a blockchain-based trust management model for location privacy preserving.  ... 
doi:10.1109/tits.2021.3080875 fatcat:tvd6ubmtmfe73mta3iorxzncju

Table of Contents

2021 IEEE Transactions on Network Science and Engineering  
Tang 2001 Privacy-Preserving Correlated Data Publication: Privacy Analysis and Optimal Noise Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ...  Duong 2651 Optimal Target User Selection Policy for D2D Wireless Caching Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  ... 
doi:10.1109/tnse.2021.3105033 fatcat:4vpmmhlwmfgqteqxrk6o2qkmjy
« Previous Showing results 1 — 15 out of 2,434 results