Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
source location privacy
biblio
A Protecting Source-Location Privacy Scheme for Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
security architecture
Location Privacy in Wireless Networks
source location protection
Smart IoT
protecting source-location privacy scheme
Privacy Protections
multi-sinks
critical problems
CPSLP scheme
attack modes
source location privacy
cloud-based
Position measurement
daily activities
Transforms
Compositionality
Cloud Computing
probability
telecommunication network routing
Metrics
sensor nodes
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
security
telecommunication security
data privacy
biblio
Realizing Source Location Privacy in Wireless Sensor Networks Through Agent Node Routing
Submitted by aekwall on Mon, 10/26/2020 - 11:54am
telecommunication network routing
Location Privacy in Wireless Networks
tactically positioned agent nodes
source location privacy
random routing techniques
random routing
Phantoms
agent node routing
agent node
adversary
Position measurement
source node
WSN
Compositionality
Safety
Metrics
sensor placement
sensor nodes
Routing
privacy
wireless sensor networks
Wireless Sensor Network
pubcrawl
Human behavior
Resiliency
telecommunication security
Monitoring
biblio
Providing Location Privacy Using Fake Sources in Wireless Sensor Networks
Submitted by aekwall on Mon, 10/26/2020 - 11:53am
Routing protocols
Location Privacy in Wireless Networks
source location privacy
resource-constrained sensor nodes
location privacy protection
Global Adversary
context privacy
Position measurement
WSN
Compositionality
computer science
Monitoring
network traffic
Metrics
Routing
privacy
wireless sensor networks
pubcrawl
Human behavior
Resiliency
data privacy
biblio
Deconstructing Source Location Privacy-Aware Routing Protocols
Submitted by grigby1 on Wed, 11/28/2018 - 1:58pm
anonymous messaging
components
decomposition
pubcrawl
resilience
Resiliency
Routing
Scalability
source location privacy
spatial
temporal
wireless sensor networks
biblio
An Efficient Source Anonymity Technique Based on Exponential Distribution Against a Global Adversary Model Using Fake Injections
Submitted by grigby1 on Thu, 05/24/2018 - 12:26pm
context privacy
Measurement
Metrics
privacy
privacy models
pubcrawl
source location privacy
wsns privacy
biblio
Inspecting the Ways of Source Anonymity in Wireless Sensor Network
Submitted by BrandonB on Mon, 05/04/2015 - 1:45pm
adversarial assumptions
anonymity
coding theory
Communication Systems
event source anonymity
LSB steganography technique
network traffic
persistent dummy traffic
source location privacy
statistical test
Steganography
telecommunication traffic
Wireless Sensor Network
wireless sensor networks
« first
‹ previous
1
2