{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:57:09Z","timestamp":1756000629124},"reference-count":91,"publisher":"National Library of Serbia","issue":"2","license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ComSIS","COMPUT SCI INF SYST","COMPUT SCI INFORM SY","COMPUTER SCI INFORM","COMSIS J"],"published-print":{"date-parts":[[2022]]},"abstract":"<jats:p>This review article summarises the protocols proposed in recent researches to secure location information in Wireless Sensor Networks (WSNs). Due to their lightweightness and easy to deploy properties, WSNs are widely used in numerous object tracking and monitoring applications. Due to such, source location privacy attracts the researchers and hence continuously enhances its improvement. Though, this privacy breach is not acceptable for WSNs, as it may reveal some critical information that is harmful. The SLP issue on WSN attracted researchers a lot, and hence a number of solutions are provided for it. However, an up-to-date survey does not exist for the same. To fill this gap, in this article, we summarize different approaches proposed in the last years to preserve location privacy. We first discuss the different privacy characteristics in WSNs, a detailed overview of the proposed protocols and their limitations, and discussions of solutions for the adversaries? capabilities in WSNs. Then the future research directions in this area are discussed. This review work may support researchers identifying the new research area in location privacy of wireless sensor networks.<\/jats:p>","DOI":"10.2298\/csis211009007r","type":"journal-article","created":{"date-parts":[[2022,3,2]],"date-time":"2022-03-02T08:10:26Z","timestamp":1646208626000},"page":"857-886","source":"Crossref","is-referenced-by-count":6,"title":["Recent advancements in privacy-aware protocols of source location privacy in wireless sensor networks: A survey"],"prefix":"10.2298","volume":"19","author":[{"suffix":"Kumar","given":"Pradeep","family":"Roy","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering Indian Institute of Information Technology, Surat, India"}]},{"suffix":"Kumar","given":"Asis","family":"Tripathy","sequence":"additional","affiliation":[{"name":"School of Information Technology and Engineering Vellore Institute of Technology, Vellore, Tamil Nadu, India"}]},{"suffix":"Kumar","given":"Sunil","family":"Singh","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering VIT-AP University, Near Vijaywada, Andhra Pradesh, India"}]},{"given":"Kuan-Ching","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Information Engineering (CSIE), Providence University, Taiwan"}]}],"member":"1078","reference":[{"key":"ref1","doi-asserted-by":"crossref","unstructured":"T. Qiu, R. Qiao, and D. O. Wu, \u201cEabs: An event-aware backpressure scheduling scheme for emergency internet of things,\u201d IEEE Transactions on Mobile Computing, vol. 17, no. 1, pp. 72-84, 2017.","DOI":"10.1109\/TMC.2017.2702670"},{"key":"ref2","doi-asserted-by":"crossref","unstructured":"P. Rawat, K. D. Singh, H. Chaouchi, and J. M. Bonnin, \u201cWireless sensor networks: a survey on recent developments and potential synergies,\u201d The Journal of supercomputing, vol. 68, no. 1, pp. 1-48, 2014.","DOI":"10.1007\/s11227-013-1021-9"},{"key":"ref3","doi-asserted-by":"crossref","unstructured":"B. Chakraborty, S. Verma, and K. P. Singh, \u201cDifferentially private location privacy preservation in wireless sensor networks,\u201d Wireless Personal Communications, vol. 104, no. 1, pp. 387-406, 2019.","DOI":"10.1007\/s11277-018-6026-5"},{"key":"ref4","doi-asserted-by":"crossref","unstructured":"M. M. Mahmoud and X. Shen, \u201cA cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks,\u201d IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 10, pp. 1805-1818, 2012.","DOI":"10.1109\/TPDS.2011.302"},{"key":"ref5","doi-asserted-by":"crossref","unstructured":"P. K. Roy, J. P. Singh, P. Kumar, and M. Singh, \u201c3rd international conference on recent trends in computing 2015 (icrtc-2015) source location privacy using fake source and phantom routing (fsapr) technique in wireless sensor networks,\u201d Procedia Computer Science, vol. 57, pp. 936 - 941, 2015.","DOI":"10.1016\/j.procs.2015.07.486"},{"key":"ref6","unstructured":"U. Kamat, Y. Zhang, and C. Ozturk, \u201cEnhancing source-location privacy in sensor network routing,\u201d in 25th IEEE International Conference on Distributed Computing Systems (ICDCS, 2005, pp. 599-608."},{"key":"ref7","doi-asserted-by":"crossref","unstructured":"M. Conti, J. Willemsen, and B. Crispo, \u201cProviding source location privacy in wireless sensor networks: A survey,\u201d IEEE Communications Surveys Tutorials, vol. 15, no. 3, pp. 1238-1280, Third 2013.","DOI":"10.1109\/SURV.2013.011413.00118"},{"key":"ref8","doi-asserted-by":"crossref","unstructured":"N. Li, N. Zhang, S. K. Das, and B. Thuraisingham, \u201cPrivacy preservation in wireless sensor networks: A state-of-the-art survey,\u201d Ad Hoc Networks, vol. 7, no. 8, pp. 1501-1514, 2009.","DOI":"10.1016\/j.adhoc.2009.04.009"},{"key":"ref9","unstructured":"J. Lopez and J. Zhou, \u201cWireless sensor network security, vol. 1 of cryptology and information security series,\u201d pp. 223-250, 2008."},{"key":"ref10","doi-asserted-by":"crossref","unstructured":"S. Lee, J. Kim, and Y. Kim, \u201cPreserving source-and sink-location privacy in sensor networks.\u201d Comput. Sci. Inf. Syst., vol. 13, no. 1, pp. 115-130, 2016.","DOI":"10.2298\/CSIS141027040L"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"R. Rios, J. Lopez, and J. Cuellar, \u201cLocation privacy in wsns: solutions, challenges, and future trends,\u201d in Foundations of Security Analysis and Design VII. Springer, 2013, pp. 244-282.","DOI":"10.1007\/978-3-319-10082-1_9"},{"key":"ref12","doi-asserted-by":"crossref","unstructured":"J. Jiang, G. Han, H. Wang, and M. Guizani, \u201cPrivacy models in wireless sensor networks: A survey,\u201d Journal of Sensors, vol. 2016, pp. 1 - 18, 2016.","DOI":"10.1155\/2016\/4082084"},{"key":"ref13","doi-asserted-by":"crossref","unstructured":"S. Gupta and B. Prince, \u201cPreserving privacy of source location using random walk: A survey,\u201d in 2016 IEEE International Conference on Recent Trends in Electronics, Information Communication Technology (RTEICT), 2016, pp. 2047-2051.","DOI":"10.1109\/RTEICT.2016.7808199"},{"key":"ref14","doi-asserted-by":"crossref","unstructured":"J. Jiang, G. Han, H.Wang, and M. Guizani, \u201cA survey on location privacy protection in wireless sensor networks,\u201d Journal of Network and Computer Applications, vol. 125, pp. 93-114, 2019.","DOI":"10.1016\/j.jnca.2018.10.008"},{"key":"ref15","doi-asserted-by":"crossref","unstructured":"M. Kamarei, A. Patooghy, A. Alsharif, and V. Hakami, \u201cSimple: A unified single and multipath routing algorithm for wireless sensor networks with source location privacy,\u201d IEEE Access, vol. 8, pp. 33 818-33 829, 2020.","DOI":"10.1109\/ACCESS.2020.2972354"},{"key":"ref16","doi-asserted-by":"crossref","unstructured":"V. Gomathy, N. Padhy, D. Samanta, M. Sivaram, V. Jain, and I. S. Amiri, \u201cMalicious node detection using heterogeneous cluster based secure routing protocol (hcbs) in wireless adhoc sensor networks,\u201d Journal of Ambient Intelligence and Humanized Computing, pp. 1-7, 2020.","DOI":"10.1007\/s12652-020-01797-3"},{"key":"ref17","doi-asserted-by":"crossref","unstructured":"C. Ozturk and Y. Zhang, \u201cSource-location privacy in energy-constrained sensor network routing,\u201d in In ACM SASN, 2004, pp. 88-93.","DOI":"10.1145\/1029102.1029117"},{"key":"ref18","doi-asserted-by":"crossref","unstructured":"A. Jhumka, M. Leeke, and S. Shrestha, \u201cOn the use of fake sources for source location privacy: Trade-offs between energy and privacy,\u201d The Computer Journal, vol. 54, no. 6, pp. 860-874, 2011.","DOI":"10.1093\/comjnl\/bxr010"},{"key":"ref19","doi-asserted-by":"crossref","unstructured":"P. Kumar, J. P. Singh, P. Vishnoi, and M. P. Singh, \u201cSource location privacy using multiplephantom nodes in wsn,\u201d in TENCON 2015 - 2015 IEEE Region 10 Conference, Nov 2015, pp. 1-6.","DOI":"10.1109\/TENCON.2015.7372969"},{"key":"ref20","doi-asserted-by":"crossref","unstructured":"Q. Wang, J. Zhan, X. Ouyang, and Y. Ren, \u201cSps and dps: Two new grid-based source location privacy protection schemes in wireless sensor networks,\u201d Sensors, vol. 19, no. 9, p. 2074, 2019.","DOI":"10.3390\/s19092074"},{"key":"ref21","doi-asserted-by":"crossref","unstructured":"U. Adilbekov, A. Adilova, and S. Saginbekov, \u201cProviding location privacy using fake sources in wireless sensor networks,\u201d in 2018 IEEE 12th International Conference on Application of Information and Communication Technologies (AICT). IEEE, 2018, pp. 1-4.","DOI":"10.1109\/ICAICT.2018.8747041"},{"key":"ref22","doi-asserted-by":"crossref","unstructured":"L. C. Mutalemwa and S. Shin, \u201cSecure routing protocols for source node privacy protection in multi-hop communication wireless networks,\u201d Energies, vol. 13, no. 2, pp. 1-30, 2020.","DOI":"10.3390\/en13020292"},{"key":"ref23","unstructured":"Y. Ouyang, Z. Le, G. Chen, J. Ford, and F. Makedon, \u201cEntrapping adversaries for source protection in sensor networks,\u201d in Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks. IEEE Computer Society, 2006, pp. 23-34."},{"key":"ref24","doi-asserted-by":"crossref","unstructured":"M. Shao, Y. Yang, S. Zhu, and G. Cao, \u201cTowards statistically strong source anonymity for sensor networks,\u201d in INFOCOM 2008. The 27th Conference on Computer Communications. IEEE. IEEE, 2008, pp. 466-474.","DOI":"10.1109\/INFOCOM.2008.19"},{"key":"ref25","doi-asserted-by":"crossref","unstructured":"W.-P. Wang, L. Chen, and J.-X. Wang, \u201cA source-location privacy protocol in wsn based on locational angle,\u201d in 2008 IEEE International Conference on Communications. IEEE, 2008, pp. 1630-1634.","DOI":"10.1109\/ICC.2008.315"},{"key":"ref26","doi-asserted-by":"crossref","unstructured":"R. Doomun, T. Hayajneh, P. Krishnamurthy, and D. Tipper, \u201cSecloud: Source and destination seclusion using clouds for wireless ad hoc networks,\u201d in Computers and Communications, 2009. ISCC 2009. IEEE Symposium. IEEE, 2009, pp. 361-367.","DOI":"10.1109\/ISCC.2009.5202367"},{"key":"ref27","doi-asserted-by":"crossref","unstructured":"N.Wang, J. Fu, J. Li, and B. Bhargava, \u201cSource-location privacy protection based on anonymity cloud in wireless sensor networks,\u201d IEEE Transactions on Information Forensics and Security, vol. 15, no. 1, pp. 100-114, 2020.","DOI":"10.1109\/TIFS.2019.2919388"},{"key":"ref28","doi-asserted-by":"crossref","unstructured":"H. Wang, B. Sheng, and Q. Li, \u201cPrivacy-aware routing in sensor networks,\u201d Computer Networks, vol. 53, no. 9, pp. 1512-1529, 2009.","DOI":"10.1016\/j.comnet.2009.02.002"},{"key":"ref29","doi-asserted-by":"crossref","unstructured":"M. Shao, S. Zhu,W. Zhang, G. Cao, and Y. Yang, \u201cpdcs: Security and privacy support for datacentric sensor networks,\u201d IEEE Transactions on Mobile Computing, vol. 8, no. 8, pp. 1023- 1038, 2009.","DOI":"10.1109\/TMC.2008.168"},{"key":"ref30","doi-asserted-by":"crossref","unstructured":"P. Winter and M. Zachariasen, \u201cEuclidean steiner minimum trees: An improved exact algorithm,\u201d Networks, vol. 30, no. 3, pp. 149-166, 1997.","DOI":"10.1002\/(SICI)1097-0037(199710)30:3<149::AID-NET1>3.0.CO;2-L"},{"key":"ref31","doi-asserted-by":"crossref","unstructured":"B. H. Bloom, \u201cSpace\/time trade-offs in hash coding with allowable errors,\u201d Communications of the ACM, vol. 13, no. 7, pp. 422-426, 1970.","DOI":"10.1145\/362686.362692"},{"key":"ref32","doi-asserted-by":"crossref","unstructured":"B. Alomair, A. Clark, J. Cuellar, and R. Poovendran, \u201cStatistical framework for source anonymity in sensor networks,\u201d in Global Telecommunications Conference (GLOBECOM 2010), 2010 IEEE. IEEE, 2010, pp. 1-6.","DOI":"10.1109\/GLOCOM.2010.5684248"},{"key":"ref33","doi-asserted-by":"crossref","unstructured":"S. Kokalj-Filipovi\u0107, F. Le Fessant, and P. Spasojevi\u0106, \u201cThe quality of source location protection in globally attacked sensor networks,\u201d in Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on. IEEE, 2011, pp. 44-49.","DOI":"10.1109\/PERCOMW.2011.5766931"},{"key":"ref34","doi-asserted-by":"crossref","unstructured":"R. Rios and J. Lopez, \u201cExploiting context-awareness to enhance source-location privacy in wireless sensor networks,\u201d The Computer Journal, pp. 1-11, 2011.","DOI":"10.1093\/comjnl\/bxr055"},{"key":"ref35","unstructured":"P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk, \u201cEnhancing source-location privacy in sensor network routing,\u201d in Distributed Computing Systems, 2005. ICDCS 2005. Proceedings. 25th IEEE International Conference on. IEEE, 2005, pp. 599-608."},{"key":"ref36","doi-asserted-by":"crossref","unstructured":"S. Gupta, P. Kumar, J. P. Singh, and M. P. Singh, \u201cPrivacy preservation of source location using phantom nodes,\u201d in Information Technology: New Generations, S. Latifi, Ed. Cham: Springer International Publishing, 2016, pp. 247-256.","DOI":"10.1007\/978-3-319-32467-8_23"},{"key":"ref37","doi-asserted-by":"crossref","unstructured":"J. Chen, Z. Lin, Y. Liu, Y. Hu, and X. Du, \u201cSink location protection protocols based on packet sending rate adjustment,\u201d International Journal of Distributed Sensor Networks, vol. 12, no. 1, pp. 1-10, 2016.","DOI":"10.1155\/2016\/6354514"},{"key":"ref38","doi-asserted-by":"crossref","unstructured":"K. Mehta, D. Liu, and M. Wright, \u201cProtecting location privacy in sensor networks against a global eavesdropper,\u201d IEEE Transactions on Mobile Computing, vol. 11, no. 2, pp. 320-336, 2012.","DOI":"10.1109\/TMC.2011.32"},{"key":"ref39","doi-asserted-by":"crossref","unstructured":"L. Zhou and Y. Shan, \u201cMulti-branch source location privacy protection scheme based on random walk in wsns,\u201d in 2019 IEEE 4th International Conference on Cloud Computing and Big Data Analysis (ICCCBDA). IEEE, 2019, pp. 543-547.","DOI":"10.1109\/ICCCBDA.2019.8725631"},{"key":"ref40","doi-asserted-by":"crossref","unstructured":"G. Han, H. Wang, X. Miao, L. Liu, J. Jiang, and Y. Peng, \u201cA dynamic multipath scheme for protecting source-location privacy using multiple sinks in wsns intended for iiot,\u201d IEEE Transactions on Industrial Informatics, vol. 16, no. 8, pp. 5527-5538, 2019.","DOI":"10.1109\/TII.2019.2953937"},{"key":"ref41","doi-asserted-by":"crossref","unstructured":"W. Tan, K. Xu, and D. Wang, \u201cAn anti-tracking source-location privacy protection protocol in wsns based on path extension,\u201d IEEE Internet of Things Journal, vol. 1, no. 5, pp. 461-471, 2014.","DOI":"10.1109\/JIOT.2014.2346813"},{"key":"ref42","doi-asserted-by":"crossref","unstructured":"P. Spachos, D. Toumpakaris, and D. Hatzinakos, \u201cAngle-based dynamic routing scheme for source location privacy in wireless sensor networks,\u201d in 2014 IEEE 79th Vehicular Technology Conference (VTC Spring). IEEE, 2014, pp. 1-5.","DOI":"10.1109\/VTCSpring.2014.7022833"},{"key":"ref43","doi-asserted-by":"crossref","unstructured":"X. Miao, G. Han, Y. He, H. Wang, and J. Jiang, \u201cA protecting source-location privacy scheme for wireless sensor networks,\u201d in 2018 IEEE International Conference on Networking, Architecture and Storage (NAS). IEEE, 2018, pp. 1-5.","DOI":"10.1109\/NAS.2018.8515721"},{"key":"ref44","doi-asserted-by":"crossref","unstructured":"L. Zhou, Y. Shan, and X. Chen, \u201cAn anonymous routing scheme for preserving location privacy in wireless sensor networks,\u201d in 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE, 2019, pp. 262-265.","DOI":"10.1109\/ITNEC.2019.8728980"},{"key":"ref45","doi-asserted-by":"crossref","unstructured":"I. T. Almalkawi, J. Raed, N. Alghaeb, and M. G. Zapata, \u201cAn efficient location privacy scheme for wireless multimedia sensor networks,\u201d in 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, 2019, pp. 1615-1618.","DOI":"10.1109\/ETFA.2019.8869338"},{"key":"ref46","doi-asserted-by":"crossref","unstructured":"G. Han, X. Miao, H. Wang, M. Guizani, and W. Zhang, \u201cCpslp: A cloud-based scheme for protecting source location privacy in wireless sensor networks using multi-sinks,\u201d IEEE Transactions on Vehicular Technology, vol. 68, no. 3, pp. 2739-2750, 2019.","DOI":"10.1109\/TVT.2019.2891127"},{"key":"ref47","doi-asserted-by":"crossref","unstructured":"L. Bai, H. Zhu, and G. Li, \u201cPrivacy protection algorithm based on random annular region in wsn,\u201d in 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS). IEEE, 2018, pp. 64-67.","DOI":"10.1109\/ICSESS.2018.8663818"},{"key":"ref48","doi-asserted-by":"crossref","unstructured":"L. C. Mutalemwa and S. Shin, \u201cStrategic location-based random routing for source location privacy in wireless sensor networks,\u201d Sensors, vol. 18, no. 7, p. 2291, 2018.","DOI":"10.3390\/s18072291"},{"key":"ref49","doi-asserted-by":"crossref","unstructured":"H.Wang, G. Han,W. Zhang, M. Guizani, and S. Chan, \u201cA probabilistic source location privacy protection scheme in wireless sensor networks,\u201d IEEE Transactions on Vehicular Technology, vol. 68, no. 6, pp. 5917-5927, 2019.","DOI":"10.1109\/TVT.2019.2909505"},{"key":"ref50","doi-asserted-by":"crossref","unstructured":"M. Bradbury, A. Jhumka, and M. Leeke, \u201cHybrid online protocols for source location privacy in wireless sensor networks,\u201d Journal of Parallel and Distributed Computing, vol. 115, pp. 67-81, 2018.","DOI":"10.1016\/j.jpdc.2018.01.006"},{"key":"ref51","doi-asserted-by":"crossref","unstructured":"N. Wang, J. Fu, J. Zeng, and B. K. Bhargava, \u201cSource-location privacy full protection in wireless sensor networks,\u201d Information Sciences, vol. 444, pp. 105-121, 2018.","DOI":"10.1016\/j.ins.2018.02.064"},{"key":"ref52","doi-asserted-by":"crossref","unstructured":"H. Wang, L. Wu, Q. Zhao, Y. Wei, and H. Jiang, \u201cEnergy balanced source location privacy scheme using multibranch path in wsns for iot,\u201d Wireless Communications and Mobile Computing, vol. 2021, 2021.","DOI":"10.1155\/2021\/6654427"},{"key":"ref53","doi-asserted-by":"crossref","unstructured":"M. F. Al-Mistarihi, I. M. Tanash, F. S. Yaseen, and K. A. Darabkh, \u201cProtecting source location privacy in a clustered wireless sensor networks against local eavesdroppers,\u201d Mobile Networks and Applications, vol. 25, no. 1, pp. 42-54, 2020.","DOI":"10.1007\/s11036-018-1189-6"},{"key":"ref54","doi-asserted-by":"crossref","unstructured":"Y. Chen, J. Sun, Y. Yang, T. Li, X. Niu, and H. Zhou, \u201cPsspr: A source location privacy protection scheme based on sector phantom routing in wsns,\u201d International Journal of Intelligent Systems, 2021.","DOI":"10.1002\/int.22666"},{"key":"ref55","doi-asserted-by":"crossref","unstructured":"D. Tang, J. Gu, W. Han, and X. Ma, \u201cQuantitative analysis on source-location privacy for wireless sensor networks,\u201d in IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 2020, pp. 805-809.","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162756"},{"key":"ref56","doi-asserted-by":"crossref","unstructured":"A. Arivarasi and P. Ramesh, \u201cReview of source location security protection using trust authentication schema,\u201d in 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE, 2020, pp. 215-222.","DOI":"10.1109\/ICSSIT48917.2020.9214268"},{"key":"ref57","doi-asserted-by":"crossref","unstructured":"A. Alzaabi, A. Aldoobi, D. Alnuaimi, L. Alserkal, M. Alsuwaidi, and N. Ababneh, \u201cGridbased source location privacy protection schemes in iot wireless sensor networks,\u201d in 2021 4th International Conference on Data Storage and Data Engineering, 2021, pp. 31-36.","DOI":"10.1145\/3456146.3456152"},{"key":"ref58","doi-asserted-by":"crossref","unstructured":"A. Arivarasi and P. Ramesh, \u201cAn improved source location privacy protection using adaptive trust sector-based authentication with honey encryption algorithm in wsn,\u201d Journal of Ambient Intelligence and Humanized Computing, pp. 1-13, 2021.","DOI":"10.1007\/s12652-021-03021-2"},{"key":"ref59","doi-asserted-by":"crossref","unstructured":"Z. Zhou, Y.Wang, P. Li, X. Chang, and J. Luo, \u201cNode location privacy protection in unattended wireless sensor networks,\u201d Mathematical Problems in Engineering, vol. 2021, 2021.","DOI":"10.1155\/2021\/5539382"},{"key":"ref60","doi-asserted-by":"crossref","unstructured":"L. C. Mutalemwa and S. Shin, \u201cNovel approaches to realize the reliability of location privacy protocols in monitoring wireless networks,\u201d IEEE Access, vol. 9, pp. 104 820-104 836, 2021.","DOI":"10.1109\/ACCESS.2021.3099499"},{"key":"ref61","doi-asserted-by":"crossref","unstructured":"C. M. George and S. L. Babu, \u201cA scalable correlation clustering strategy in location privacy for wireless sensor networks against a universal adversary,\u201d in 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE). IEEE, 2019, pp. 1-3.","DOI":"10.1109\/ICCIKE47802.2019.9004343"},{"key":"ref62","doi-asserted-by":"crossref","unstructured":"M. A. Tamtalini, A. E. B. El Alaoui, and A. El Fergougui, \u201cEslc-wsn: A novel energy efficient security aware localization and clustering in wireless sensor networks,\u201d in 2020 1st International Conference on Innovative Research in Applied Science, Engineering and Technology (IRASET). IEEE, 2020, pp. 1-6.","DOI":"10.1109\/IRASET48871.2020.9092203"},{"key":"ref63","doi-asserted-by":"crossref","unstructured":"A. Majeed, K. Liu, and N. Abu-Ghazaleh, \u201cTarp: Timing analysis resilient protocol for wireless sensor networks,\u201d in 2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. IEEE, 2009, pp. 85-90.","DOI":"10.1109\/WiMob.2009.24"},{"key":"ref64","doi-asserted-by":"crossref","unstructured":"Y. Yang, M. Shao, S. Zhu, B. Urgaonkar, and G. Cao, \u201cTowards event source unobservability with minimum network traffic in sensor networks,\u201d in Proceedings of the first ACM conference on Wireless network security. ACM, 2008, pp. 77-88.","DOI":"10.1145\/1352533.1352547"},{"key":"ref65","doi-asserted-by":"crossref","unstructured":"K. Bicakci, H. Gultekin, B. Tavli, and I. E. Bagci, \u201cMaximizing lifetime of event-unobservable wireless sensor networks,\u201d Computer Standards & Interfaces, vol. 33, no. 4, pp. 401-410, 2011.","DOI":"10.1016\/j.csi.2011.01.001"},{"key":"ref66","doi-asserted-by":"crossref","unstructured":"Y. Yang, J. Zhou, R. H. Deng, and F. Bao, \u201cBetter security enforcement in trusted computing enabled heterogeneous wireless sensor networks,\u201d Security and Communication Networks, vol. 4, no. 1, pp. 11-22, 2011.","DOI":"10.1002\/sec.179"},{"key":"ref67","doi-asserted-by":"crossref","unstructured":"S. Ortolani, M. Conti, B. Crispo, and R. D. Pietro, \u201cEvents privacy in wsns: A new model and its application,\u201d in World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2011 IEEE International Symposium on a. IEEE, 2011, pp. 1-9.","DOI":"10.1109\/WoWMoM.2011.5986491"},{"key":"ref68","doi-asserted-by":"crossref","unstructured":"R. Lu, X. Lin, H. Zhu, and X. Shen, \u201cTesp2: Timed efficient source privacy preservation scheme for wireless sensor networks,\u201d in Communications (ICC), 2010 IEEE International Conference on. IEEE, 2010, pp. 1-6.","DOI":"10.1109\/ICC.2010.5502142"},{"key":"ref69","doi-asserted-by":"crossref","unstructured":"Y. Ouyang, Z. Le, D. Liu, J. Ford, and F. Makedon, \u201cSource location privacy against laptopclass attacks in sensor networks,\u201d in Proceedings of the 4th international conference on Security and privacy in communication netowrks. ACM, 2008, pp. 1-10.","DOI":"10.1145\/1460877.1460884"},{"key":"ref70","doi-asserted-by":"crossref","unstructured":"W. Yang and W. T. Zhu, \u201cProtecting source location privacy in wireless sensor networks with data aggregation,\u201d in International Conference on Ubiquitous Intelligence and Computing. Springer, 2010, pp. 252-266.","DOI":"10.1007\/978-3-642-16355-5_22"},{"key":"ref71","doi-asserted-by":"crossref","unstructured":"H. Chen and W. Lou, \u201cFrom nowhere to somewhere: protecting end-to-end location privacy in wireless sensor networks,\u201d in International Performance Computing and Communications Conference. IEEE, 2010, pp. 1-8.","DOI":"10.1109\/PCCC.2010.5682341"},{"key":"ref72","doi-asserted-by":"crossref","unstructured":"A. Abbasi, A. Khonsari, and M. S. Talebi, \u201cSource location anonymity for sensor networks,\u201d in Consumer Communications and Networking Conference, 2009. CCNC 2009. 6th IEEE. IEEE, 2009, pp. 1-5.","DOI":"10.1109\/CCNC.2009.4784915"},{"key":"ref73","unstructured":"G. Suarez-Tangil, E. Palomar, B. Ramos, and A. Ribagorda, \u201cAn experimental comparison of source location privacy methods for power optimization in wsns,\u201d in Proceedings of the 3rd WSEAS international conference on Advances in sensors, signals and materials, 2010, pp. 79- 84."},{"key":"ref74","doi-asserted-by":"crossref","unstructured":"X. Deng, X. Xin, and T. Gao, \u201cA location privacy protection scheme based on random encryption period for vsns,\u201d Journal of Ambient Intelligence and Humanized Computing, vol. 11, no. 3, pp. 1351-1359, 2020.","DOI":"10.1007\/s12652-019-01227-z"},{"key":"ref75","doi-asserted-by":"crossref","unstructured":"M. Alrashidi, N. Nasri, S. Khediri, and A. Kachouri, \u201cEnergy-efficiency clustering and data collection for wireless sensor networks in industry 4.0,\u201d Journal of Ambient Intelligence and Humanized Computing, 2020.","DOI":"10.1007\/s12652-020-02146-0"},{"key":"ref76","doi-asserted-by":"crossref","unstructured":"W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher, \u201cPda: Privacy-preserving data aggregation in wireless sensor networks,\u201d in IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, 2007, pp. 2045-2053.","DOI":"10.1109\/INFCOM.2007.237"},{"key":"ref77","doi-asserted-by":"crossref","unstructured":"Y. Yang, X. Wang, S. Zhu, and G. Cao, \u201cSdap: A secure hop-by-hop data aggregation protocol for sensor networks,\u201d vol. 11, no. 4, pp. 1-43, 2008.","DOI":"10.1145\/1380564.1380568"},{"key":"ref78","doi-asserted-by":"crossref","unstructured":"Abizar, Farman, Jan, Khan, and Koubaa, \u201cA smart energy-based source location privacy preservation model for internet of things-based vehicular ad hoc networks,\u201d Transactions on Emerging Telecommunications Technologies, pp. 1-14, 2020.","DOI":"10.1002\/ett.3973"},{"key":"ref79","doi-asserted-by":"crossref","unstructured":"J. Wu, Z. Chen, and M. Zhao, \u201cAn efficient data packet iteration and transmission algorithm in opportunistic social networks,\u201d Journal of Ambient Intelligence and Humanized Computing, pp. 1-13, 2019.","DOI":"10.1007\/s12652-019-01480-2"},{"key":"ref80","doi-asserted-by":"crossref","unstructured":"A. S. H. Abdul-Qawy and T. Srinivasulu, \u201cSees: a scalable and energy-efficient scheme for green iot-based heterogeneous wireless nodes,\u201d Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 4, pp. 1571-1596, 2019.","DOI":"10.1007\/s12652-018-0758-7"},{"key":"ref81","doi-asserted-by":"crossref","unstructured":"S. K. Singh and P. Kumar, \u201cA load balancing virtual level routing (lbvlr) using mobile mule for large sensor networks,\u201d The Journal of Supercomputing, vol. 75, no. 11, pp. 7426-7459, 2019.","DOI":"10.1007\/s11227-019-02952-0"},{"key":"ref82","doi-asserted-by":"crossref","unstructured":"A. Aranganathan and C. Suriyakala, \u201cAn efficient secure detection and prevention of malevolent nodes with lightweight surprise check scheme using trusted mobile agents in mobile ad-hoc networks,\u201d Journal of Ambient Intelligence and Humanized Computing, vol. 10, no. 9, pp. 3493-3503, 2019.","DOI":"10.1007\/s12652-018-1069-8"},{"key":"ref83","doi-asserted-by":"crossref","unstructured":"J.-A. Kim, D. G. Park, and J. Jeong, \u201cDesign and performance evaluation of cost-effective function-distributed mobility management scheme for software-defined smart factory networking,\u201d Journal of Ambient Intelligence and Humanized Computing, pp. 1-17, 2019.","DOI":"10.1007\/s12652-019-01356-5"},{"key":"ref84","doi-asserted-by":"crossref","unstructured":"G. DaSilva, V. Loud, A. Salazar, J. Soto, and A. Elleithy, \u201cContext-oriented privacy protection in wireless sensor networks,\u201d in 2019 IEEE Long Island Systems, Applications and Technology Conference (LISAT), 2019, pp. 1-4.","DOI":"10.1109\/LISAT.2019.8817341"},{"key":"ref85","doi-asserted-by":"crossref","unstructured":"C. Huang, M. Ma, Y. Liu, and A. Liu, \u201cPreserving source location privacy for energy harvesting wsns,\u201d Sensors, vol. 17, no. 4, p. 724, 2017.","DOI":"10.3390\/s17040724"},{"key":"ref86","doi-asserted-by":"crossref","unstructured":"M. Raj, N. Li, D. Liu, M. Wright, and S. K. Das, \u201cUsing data mules to preserve source location privacy in wireless sensor networks,\u201d Pervasive and Mobile Computing, vol. 11, pp. 244 - 260, 2014.","DOI":"10.1016\/j.pmcj.2012.10.002"},{"key":"ref87","doi-asserted-by":"crossref","unstructured":"G. Han, H. Wang, J. Jiang, W. Zhang, and S. Chan, \u201cCaslp: A confused arc-based source location privacy protection scheme in wsns for iot,\u201d IEEE Communications Magazine, vol. 56, no. 9, pp. 42-47, 2018.","DOI":"10.1109\/MCOM.2018.1701062"},{"key":"ref88","doi-asserted-by":"crossref","unstructured":"R.-h. Hu, X.-m. Dong, and D.-l. Wang, \u201cProtecting data source location privacy in wireless sensor networks against a global eavesdropper,\u201d International Journal of Distributed Sensor Networks, vol. 10, no. 8, pp. 1-17, 2014.","DOI":"10.1155\/2014\/492802"},{"key":"ref89","doi-asserted-by":"crossref","unstructured":"L. Kazatzopoulos, C. Delakouridis, G. F. Marias, and P. Georgiadis, \u201cihide: hiding sources of information in wsns,\u201d in Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU\u201906), 2006, pp. 1-8.","DOI":"10.1109\/SECPERU.2006.16"},{"key":"ref90","doi-asserted-by":"crossref","unstructured":"A.-S. Abuzneid, T. Sobh, and M. Faezipour, \u201cAn enhanced communication protocol for location privacy in wsn,\u201d International Journal of Distributed Sensor Networks, vol. 11, no. 4, pp. 1-15, 2015.","DOI":"10.1155\/2015\/697098"},{"key":"ref91","doi-asserted-by":"crossref","unstructured":"J. Kumari, P. Kumar, and S. K. Singh, \u201cLocalization in three-dimensional wireless sensor networks: a survey,\u201d The Journal of Supercomputing, vol. 75, no. 8, pp. 5040-5083, 2019.","DOI":"10.1007\/s11227-019-02781-1"}],"container-title":["Computer Science and Information Systems"],"original-title":[],"language":"en","deposited":{"date-parts":[[2024,9,19]],"date-time":"2024-09-19T16:50:21Z","timestamp":1726764621000},"score":1,"resource":{"primary":{"URL":"https:\/\/doiserbia.nb.rs\/Article.aspx?ID=1820-02142200007R"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"references-count":91,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022]]}},"URL":"https:\/\/doi.org\/10.2298\/csis211009007r","relation":{},"ISSN":["1820-0214","2406-1018"],"issn-type":[{"type":"print","value":"1820-0214"},{"type":"electronic","value":"2406-1018"}],"subject":[],"published":{"date-parts":[[2022]]}}}