Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
source location privacy
biblio
FPTSA-SLP: A Fake Packet Time Slot Assignment-based Source Location Privacy Protection Scheme in Underwater Acoustic Sensor Networks
Submitted by grigby1 on Mon, 10/03/2022 - 11:48am
wireless networks
time slot assignment
relay selection
Backtracking
Location Privacy in Wireless Networks
source location privacy
location privacy
Position measurement
underwater acoustic sensor networks
Interference
simulation
pubcrawl
Compositionality
Routing
composability
privacy
Safety
Resiliency
resilience
Metrics
Human behavior
biblio
Energy Balancing and Source Node Privacy Protection in Event Monitoring Wireless Networks
Submitted by grigby1 on Mon, 10/03/2022 - 11:47am
Routing
energy balance.
Location Privacy in Wireless Networks
source location privacy
location privacy
Position measurement
Routing Protocol
Wireless Sensor Network
wireless networks
Compositionality
Monitoring
composability
Protocols
privacy
Energy Efficiency
Resiliency
resilience
Metrics
Human behavior
pubcrawl
biblio
The Impact of Energy-Inefficient Communications on Location Privacy Protection in Monitoring Wireless Networks
Submitted by grigby1 on Mon, 10/03/2022 - 11:45am
Compositionality
Location Privacy in Wireless Networks
source location privacy
location privacy
Position measurement
environmental factors
Routing Protocol
Wireless Sensor Network
Reliability
wireless networks
pubcrawl
composability
wireless sensor networks
Protocols
privacy
Energy Efficiency
Resiliency
resilience
Metrics
Human behavior
biblio
Improving the Packet Delivery Reliability and Privacy Protection in Monitoring Wireless Networks
Submitted by grigby1 on Tue, 08/17/2021 - 3:32pm
Protocols
wireless sensor networks
Wireless Sensor Network
wireless networks
source location privacy
Routing Protocol
Routing
Resiliency
resilience
Reliability
pubcrawl
Compositionality
privacy
Position measurement
packet delivery ratio
Monitoring
Metrics
Location Privacy in Wireless Networks
location privacy
Human behavior
end-to-end delay
biblio
Controlling the Communication Overhead of Source Location Privacy Protocols in Multi-hop Communication Wireless Networks
Submitted by grigby1 on Tue, 08/17/2021 - 3:31pm
privacy
wireless sensor networks
Wireless Sensor Network
wireless networks
source location privacy
Routing protocols
Routing
Resiliency
resilience
pubcrawl
communication overhead
Phantoms
phantom routing
Metrics
Location Privacy in Wireless Networks
location privacy
Human behavior
fake packet routing
energy consumption
Compositionality
biblio
MSCLP: Multi-Sinks Cluster-Based Location Privacy Protection scheme in WSNs for IoT
Submitted by grigby1 on Tue, 08/17/2021 - 3:31pm
Microelectronics
WSNs
wireless sensor networks
wireless networks
source location privacy
Routing
Resiliency
resilience
pubcrawl
privacy
Multi sinks
Compositionality
Metrics
Measurement
Location Privacy in Wireless Networks
location privacy
Human behavior
energy consumption
Dynamic Routing
delays
delay
biblio
Experimental Evaluation of Source Location Privacy Routing Schemes and Energy Consumption Performance
Submitted by aekwall on Mon, 10/26/2020 - 11:04am
source location privacy
Location Privacy in Wireless Networks
route node
relatively lower energy
modified schemes
inversely proportional relationship
guarantee longer network lifetime
Experimental Evaluation
energy consumption performance
dynamic route creation process
control angle
angle-based routing
source location privacy routing schemes
routing schemes
data privacy
sensor node
Compositionality
energy consumption
Metrics
sensor nodes
wireless sensor networks
Wireless Sensor Network
Routing protocols
pubcrawl
Human behavior
Resiliency
telecommunication security
biblio
Dynamic and Disjoint Routing Mechanism for Protecting Source Location Privacy in WSNs
Submitted by aekwall on Mon, 10/26/2020 - 11:02am
energy consumption
Location Privacy in Wireless Networks
source node localization
source location privacy
protection mechanism
k disjoint paths
intermediate node selection
Energy-efficiency
dynamic and disjoint routing mechanism
DDRM
back-tracing attack
source location privacy protection
Position measurement
WSN
Compositionality
Monitoring
Heuristic algorithms
telecommunication network routing
Metrics
Routing
privacy
graph theory
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
telecommunication security
data privacy
biblio
Investigating the Influence of Routing Scheme Algorithms on the Source Location Privacy Protection and Network Lifetime
Submitted by aekwall on Mon, 10/26/2020 - 11:02am
Compositionality
Location Privacy in Wireless Networks
tree-based algorithm
source location privacy routing schemes
SLP routing schemes
routing scheme algorithms
routing algorithms
representative schemes
privacy protection level
network lifetime performance
lowest network lifetime
highest influence
angle-based algorithm
source location privacy
Phantoms
Position measurement
data privacy
energy consumption
network lifetime
telecommunication network routing
Mathematical model
trees (mathematics)
Metrics
Computational modeling
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
biblio
Encircling the Base Station for Source Location Privacy in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 10:54am
Base stations
Location Privacy in Wireless Networks
source location privacy
signal strength
routing schemes
routing information
packet delivery
Location Privacy breach
incoming packet
dummy traffic
dummy packets
delay
base station
Phantoms
privacy breaches
TTL
telecommunication traffic
Compositionality
sensors
encryption techniques
telecommunication network routing
Metrics
Cryptography
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
Cryptographic Protocols
telecommunication security
data privacy
1
2
next ›
last »