This paper, limiting the type of attack against a sensor network to that of eavesdropping, proposes a new technique for providing anonymity using Phantom ID and ...
Abstract—Research on sensor network had been focused on security services that provide authentication, confidentiality, integrity and availability until ...
Nov 21, 2024 · This paper, limiting the type of attack against a sensor network to that of eavesdropping, proposes a new technique for providing anonymity ...
This paper, limiting the type of attack against a sensor network to that of eavesdropping, proposes a new technique for providing anonymity using Phantom ID and ...
Abstract—In this paper, we propose a simple and efficient scheme for establishing anonymity in clustered wireless sensor networks. This scheme is applied to ...
We then propose WRS, a suboptimal but practical privacy-aware routing scheme, and provide simulation results. ... So, we need to provide location anonymity for ...
Xue [5] proposed two schemes: Simple Anonymity Scheme (SAS) and Cryptographic Anonymity Scheme (CAS) for establishing anonymity in clustered WSNs. The SAS ...
The main contribution of this work is to propose an energy-efficient protocol for maintaining the anonymity of the network virtual infrastructure, ...
Feb 24, 2021 · We proposed an anonymous communication scheme that protects the privacy of the source location in the IoT.
Anonymity is accomplished by ensuring that sensor nodes, instead of transmitting their actual data, transmit a data value that was not collected. The ...