Cargando…
Preserving Source Location Privacy for Energy Harvesting WSNs
Fog (From cOre to edGe) computing employs a huge number of wireless embedded devices to enable end users with anywhere-anytime-to-anything connectivity. Due to their operating nature, wireless sensor nodes often work unattended, and hence are exposed to a variety of attacks. Preserving source-locati...
Autores principales: | Huang, Changqin, Ma, Ming, Liu, Yuxin, Liu, Anfeng |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5421684/ https://www.ncbi.nlm.nih.gov/pubmed/28358341 http://dx.doi.org/10.3390/s17040724 |
Ejemplares similares
-
Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs
por: Huang, Changqin, et al.
Publicado: (2017) -
Collaborative Localization and Location Verification in WSNs
por: Miao, Chunyu, et al.
Publicado: (2015) -
PHACK: An Efficient Scheme for Selective Forwarding Attack Detection in WSNs
por: Liu, Anfeng, et al.
Publicado: (2015) -
Differential Privacy Preservation for Location Semantics
por: Yan, Liang, et al.
Publicado: (2023) -
A Trust-Based Adaptive Probability Marking and Storage Traceback Scheme for WSNs
por: Liu, Anfeng, et al.
Publicado: (2016)