A survey on intelligent Internet of Things: Applications, security, privacy, and future directions
The rapid advances in the Internet of Things (IoT) have promoted a revolution in
communication technology and offered various customer services. Artificial intelligence (AI) …
communication technology and offered various customer services. Artificial intelligence (AI) …
Technical privacy metrics: a systematic survey
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system
and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …
and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …
Evolving privacy: From sensors to the Internet of Things
Abstract The Internet of Things (IoT) envisions a world covered with billions of smart,
interacting things capable of offering all sorts of services to near and remote entities. The …
interacting things capable of offering all sorts of services to near and remote entities. The …
Privacy preservation in wireless sensor networks: A state-of-the-art survey
Much of the existing work on wireless sensor networks (WSNs) has focused on addressing
the power and computational resource constraints of WSNs by the design of specific routing …
the power and computational resource constraints of WSNs by the design of specific routing …
Providing source location privacy in wireless sensor networks: A survey
M Conti, J Willemsen, B Crispo - … Communications Surveys & …, 2013 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) consist of numerous small nodes that can sense, collect,
and disseminate information for many different types of applications. One of these …
and disseminate information for many different types of applications. One of these …
A cloud-based scheme for protecting source-location privacy against hotspot-locating attack in wireless sensor networks
MMEA Mahmoud, X Shen - IEEE Transactions on Parallel and …, 2011 - ieeexplore.ieee.org
In wireless sensor networks, adversaries can make use of the traffic information to locate the
monitored objects, eg, to hunt endangered animals or kill soldiers. In this paper, we first …
monitored objects, eg, to hunt endangered animals or kill soldiers. In this paper, we first …
Protecting location privacy in sensor networks against a global eavesdropper
K Mehta, D Liu, M Wright - IEEE Transactions on Mobile …, 2011 - ieeexplore.ieee.org
While many protocols for sensor network security provide confidentiality for the content of
messages, contextual information usually remains exposed. Such contextual information …
messages, contextual information usually remains exposed. Such contextual information …
Location privacy in sensor networks against a global eavesdropper
K Mehta, D Liu, M Wright - 2007 IEEE International Conference …, 2007 - ieeexplore.ieee.org
While many protocols for sensor network security provide confidentiality for the content of
messages, contextual information usually remains exposed. Such information can be critical …
messages, contextual information usually remains exposed. Such information can be critical …
Applaus: A privacy-preserving location proof updating system for location-based services
Today's location-sensitive service relies on user's mobile device to determine its location
and send the location to the application. This approach allows the user to cheat by having …
and send the location to the application. This approach allows the user to cheat by having …
Towards event source unobservability with minimum network traffic in sensor networks
Y Yang, M Shao, S Zhu, B Urgaonkar… - Proceedings of the first …, 2008 - dl.acm.org
Sensors deployed to monitor the surrounding environment report such information as event
type, location, and time when a real event of interest is detected. An adversary may identify …
type, location, and time when a real event of interest is detected. An adversary may identify …