{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:40:04Z","timestamp":1750502404158,"version":"3.41.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T00:00:00Z","timestamp":1747872000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T00:00:00Z","timestamp":1747872000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1007\/s10207-025-01060-w","type":"journal-article","created":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T07:23:01Z","timestamp":1747898581000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The effect of hop-count modification attack on random walk-based SLP schemes developed for WSNs: a study"],"prefix":"10.1007","volume":"24","author":[{"given":"Manjula","family":"Raja","sequence":"first","affiliation":[]},{"given":"Anirban","family":"Ghosh","sequence":"additional","affiliation":[]},{"given":"Chukkapalli Praveen","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"Suleiman","family":"Samba","sequence":"additional","affiliation":[]},{"given":"C N","family":"Shariff","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,22]]},"reference":[{"key":"1060_CR1","unstructured":"Real Africa, Real Conservation. https:\/\/www.wildlifeact.com\/about-wildlife-act\/monitoring-tracking-technology\/. [Online; accessed 8-June-2022]"},{"key":"1060_CR2","doi-asserted-by":"crossref","unstructured":"Armenia, S., Morabito, G., Palazzo, S.: Analysis of location privacy\/energy efficiency tradeoffs in wireless sensor networks. In International Conference on Research in Networking, pages 215\u2013226. Springer, (2007)","DOI":"10.1007\/978-3-540-72606-7_19"},{"key":"1060_CR3","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.jpdc.2018.01.006","volume":"115","author":"Matthew Bradbury","year":"2018","unstructured":"Bradbury, Matthew, Jhumka, Arshad, Leeke, Matthew: Hybrid online protocols for source location privacy in wireless sensor networks. Journal of Parallel and Distributed Computing 115, 67\u201381 (2018)","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"1060_CR4","doi-asserted-by":"crossref","unstructured":"Chen, H., Lou, W.: From nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks. In International Performance Computing and Communications Conference, pages 1\u20138. IEEE, (2010)","DOI":"10.1109\/PCCC.2010.5682341"},{"key":"1060_CR5","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.pmcj.2014.01.006","volume":"16","author":"Honglong Chen","year":"2015","unstructured":"Chen, Honglong, Lou, Wei: On protecting end-to-end location privacy against local eavesdropper in wireless sensor networks. Pervasive and Mobile Computing 16, 36\u201350 (2015)","journal-title":"Pervasive and Mobile Computing"},{"issue":"3","key":"1060_CR6","doi-asserted-by":"publisher","first-page":"1238","DOI":"10.1109\/SURV.2013.011413.00118","volume":"15","author":"Mauro Conti","year":"2013","unstructured":"Conti, Mauro, Willemsen, Jeroen, Crispo, Bruno: Providing source location privacy in wireless sensor networks: A survey. IEEE Communications Surveys and Tutorials 15(3), 1238\u20131280 (2013)","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"1060_CR7","unstructured":"Deng, J., Han, R., Mishra, S.: Countermeasures against traffic analysis attacks in wireless sensor networks. In first international conference on security and privacy for emerging areas in communications networks (SECURECOMM\u201905), pages 113\u2013126. IEEE, (2005)"},{"issue":"14","key":"1060_CR8","doi-asserted-by":"publisher","first-page":"11717","DOI":"10.1109\/JIOT.2021.3058946","volume":"8","author":"Bhaskara S Egala","year":"2021","unstructured":"Egala, Bhaskara S., Pradhan, Ashok K., Badarla, Venkataramana, Mohanty, Saraju P.: Fortified-chain: A blockchain-based framework for security and privacy-assured internet of medical things with effective access control. IEEE Internet of Things Journal 8(14), 11717\u201311731 (2021)","journal-title":"IEEE Internet of Things Journal"},{"key":"1060_CR9","doi-asserted-by":"crossref","unstructured":"Han, G., Chen, Y., Wang, H., He, Y., Peng, J.: A scheme for protecting source location privacy based on hierarchical structure in smart ocean. IEEE Transactions on Intelligent Transportation Systems, pages 1\u201315, (2024)","DOI":"10.1109\/TITS.2024.3355456"},{"issue":"8","key":"1060_CR10","doi-asserted-by":"publisher","first-page":"5527","DOI":"10.1109\/TII.2019.2953937","volume":"16","author":"Guangjie Han","year":"2020","unstructured":"Han, Guangjie, Hao Wang, Xu., Miao, Li Liu, Jiang, Jinfang, Peng, Yan: A dynamic multipath scheme for protecting source-location privacy using multiple sinks in wsns intended for iiot. IEEE Transactions on Industrial Informatics 16(8), 5527\u20135538 (2020)","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"1060_CR11","doi-asserted-by":"crossref","unstructured":"He, Y., Han, G., Wang, H., Ansere, J.A., Zhang, W.: A sector-based random routing scheme for protecting the source location privacy in wsns for the internet of things. Future Generation Computer Systems, 96:438\u2013448, (2019)","DOI":"10.1016\/j.future.2019.02.049"},{"key":"1060_CR12","doi-asserted-by":"crossref","unstructured":"Jhumka, A., Bradbury, M., Leeke, M.: Towards understanding source location privacy in wireless sensor networks through fake sources. In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, pages 760\u2013768. IEEE, (2012)","DOI":"10.1109\/TrustCom.2012.281"},{"issue":"7","key":"1060_CR13","doi-asserted-by":"publisher","first-page":"3255","DOI":"10.1109\/TVT.2012.2205284","volume":"61","author":"Anfeng Liu","year":"2012","unstructured":"Liu, Anfeng, Zheng, Zhongming, Zhang, Chao, Chen, Zhigang, Shen, Xuemin: Secure and energy-efficient disjoint multipath routing for wsns. IEEE Transactions on Vehicular Technology 61(7), 3255\u20133265 (2012)","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"10","key":"1060_CR14","doi-asserted-by":"publisher","first-page":"1805","DOI":"10.1109\/TPDS.2011.302","volume":"23","author":"MMEA Mahmoud","year":"2012","unstructured":"Mahmoud, M.M.E.A., Shen, X.: A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 23(10), 1805\u20131818 (2012)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"1060_CR15","doi-asserted-by":"crossref","unstructured":"Manjula, R., Datta, R.: Application of the chinese remainder theorem for source location privacy in wireless sensor networks. In 2016 IEEE Students\u2019 Technology Symposium (TechSym), pages 202\u2013207, (2016)","DOI":"10.1109\/TechSym.2016.7872682"},{"issue":"13","key":"1060_CR16","doi-asserted-by":"publisher","first-page":"10807","DOI":"10.1109\/JIOT.2021.3126171","volume":"9","author":"R Manjula","year":"2022","unstructured":"Manjula, R., Koduru, T., Datta, R.: Protecting source location privacy in iot-enabled wireless sensor networks: The case of multiple assets. IEEE Internet of Things Journal 9(13), 10807\u201310820 (2022)","journal-title":"IEEE Internet of Things Journal"},{"issue":"5","key":"1060_CR17","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1109\/MSP.2013.111","volume":"11","author":"Vashek Matyas","year":"2013","unstructured":"Matyas, Vashek, Kur, Jiri: Conflicts between intrusion detection and privacy mechanisms for wireless sensor networks. IEEE Security & Privacy 11(5), 73\u201376 (2013)","journal-title":"IEEE Security & Privacy"},{"key":"1060_CR18","doi-asserted-by":"crossref","unstructured":"Mehta, K., Liu, D., & Wright, M.: Location privacy in sensor networks against a global eavesdropper. In 2007 IEEE International Conference on Network Protocols, pages 314\u2013323, (2007)","DOI":"10.1109\/ICNP.2007.4375862"},{"issue":"2","key":"1060_CR19","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/TMC.2011.32","volume":"11","author":"Kiran Mehta","year":"2011","unstructured":"Mehta, Kiran, Liu, Donggang, Wright, Matthew: Protecting location privacy in sensor networks against a global eavesdropper. IEEE Transactions on Mobile Computing 11(2), 320\u2013336 (2011)","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"5","key":"1060_CR20","doi-asserted-by":"publisher","first-page":"6636","DOI":"10.1109\/TII.2022.3183804","volume":"19","author":"Florence Mukamanzi","year":"2023","unstructured":"Mukamanzi, Florence, Raja, Manjula, Koduru, Tejodbhav, Datta, Raja: Position-independent and section-based source location privacy protection in wsn. IEEE Transactions on Industrial Informatics 19(5), 6636\u20136646 (2023)","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"1060_CR21","doi-asserted-by":"crossref","unstructured":"Ozturk, C., Zhang, Y., Trappe, W., Ott, M.: Source-location privacy for networks of energy-constrained sensors. In Second IEEE Workshop on Software Technologies for Future Embedded and Ubiquitous Systems, 2004. Proceedings., pages 68\u201372. IEEE, (2004)","DOI":"10.1109\/WSTFES.2004.1300417"},{"key":"1060_CR22","doi-asserted-by":"crossref","unstructured":"Raj, M., Li, N., Liu, D.: Matthew Wright, and Sajal\u00a0K Das. Using data mules to preserve source location privacy in wireless sensor networks. Pervasive and Mobile Computing, 11:244\u2013260, (2014)","DOI":"10.1016\/j.pmcj.2012.10.002"},{"issue":"6","key":"1060_CR23","doi-asserted-by":"publisher","first-page":"764","DOI":"10.1080\/03772063.2017.1371652","volume":"64","author":"Manjula Raja","year":"2018","unstructured":"Raja, Manjula, Datta, Raja: An enhanced source location privacy protection technique for wireless sensor networks using randomized routes. IETE Journal of Research 64(6), 764\u2013776 (2018)","journal-title":"IETE Journal of Research"},{"issue":"5","key":"1060_CR24","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1108\/IJPCC-05-2022-0214","volume":"19","author":"Nidhi Sharma","year":"2022","unstructured":"Sharma, Nidhi, Bhatt, Ravindara: Source location privacy preservation in iot-enabled event-driven wsns. International Journal of Pervasive Computing and Communications 19(5), 782\u2013798 (2022)","journal-title":"International Journal of Pervasive Computing and Communications"},{"issue":"7","key":"1060_CR25","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1109\/TMC.2010.36","volume":"9","author":"Tao Shu","year":"2010","unstructured":"Shu, Tao, Krunz, Marwan, Liu, Sisi: Secure data collection in wireless sensor networks using randomized dispersive routes. IEEE Transactions on Mobile Computing 9(7), 941\u2013954 (2010)","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"8","key":"1060_CR26","doi-asserted-by":"publisher","first-page":"11145","DOI":"10.1007\/s11042-022-12157-y","volume":"81","author":"Anurag Shukla","year":"2022","unstructured":"Shukla, Anurag, Singh, Deepak, Sajwan, Mohit, Kumar, Malay, Kumari, Divya, Kumar, Ajit, Panthi, Manikant: Slp-rrfpr: a source location privacy protection scheme based on random ring and limited hop fake packet routing for wireless sensor networks. Multimedia Tools and Applications 81(8), 11145\u201311185 (2022)","journal-title":"Multimedia Tools and Applications"},{"key":"1060_CR27","doi-asserted-by":"crossref","unstructured":"Tian, X., Du, X., Wang, L., Zhao, L., Han, D.: Lslpr: A layering and source-location-privacy based routing protocol for underwater acoustic sensor networks. IEEE Sensors Journal, (2023)","DOI":"10.1109\/JSEN.2023.3305544"},{"key":"1060_CR28","unstructured":"Uppal, R.: DARPA\u2019S N-Zero Extends the Lifetime of IoT Devices and Remote Sensors From Months to Years. https:\/\/www.theatlantic.com\/sponsored\/ibm-2018\/rhino-poaching\/1880\/, (2008). [Online; accessed 9-June-2022]"},{"issue":"6","key":"1060_CR29","doi-asserted-by":"publisher","first-page":"7728","DOI":"10.1109\/TVT.2023.3237653","volume":"72","author":"Hao Wang","year":"2023","unstructured":"Wang, Hao, Han, Guangjie, Lai, Weizhe, Hou, Yun, Lin, Chuan: A multi-round game-based source location privacy protection scheme with auv enabled in underwater acoustic sensor networks. IEEE Transactions on Vehicular Technology 72(6), 7728\u20137742 (2023)","journal-title":"IEEE Transactions on Vehicular Technology"},{"issue":"12","key":"1060_CR30","doi-asserted-by":"publisher","first-page":"10636","DOI":"10.1109\/JIOT.2023.3240179","volume":"10","author":"Hao Wang","year":"2023","unstructured":"Wang, Hao, Han, Guangjie, Liu, Yulin, Li, Aohan, Jiang, Jinfang: Auv-assisted stratified source location privacy protection scheme based on network coding in uasns. IEEE Internet of Things Journal 10(12), 10636\u201310648 (2023)","journal-title":"IEEE Internet of Things Journal"},{"key":"1060_CR31","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/TIFS.2019.2919388","volume":"15","author":"Na Wang","year":"2020","unstructured":"Wang, Na., Junsong, Fu., Li, Jian, Bhargava, Bharat K.: Source-location privacy protection based on anonymity cloud in wireless sensor networks. IEEE Transactions on Information Forensics and Security 15, 100\u2013114 (2020)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"1060_CR32","doi-asserted-by":"crossref","unstructured":"Yang, Y., Shao, M., Zhu, S., Urgaonkar, B., Cao, G.: Towards event source unobservability with minimum network traffic in sensor networks. In Proceedings of the first ACM conference on Wireless network security, pages 77\u201388, (2008)","DOI":"10.1145\/1352533.1352547"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01060-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01060-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01060-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:12:14Z","timestamp":1750500734000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01060-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,22]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1060"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01060-w","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2025,5,22]]},"assertion":[{"value":"22 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"No competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"The authors assure adherence to rules and ethical policy and declare that the work does not contain any human or animal involvement.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}}],"article-number":"136"}}