A Caching-Based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing
Location-based services have become prevalent and the risk of location privacy leakage
increases. Most existing schemes use third-party-based or third-party-free system …
increases. Most existing schemes use third-party-based or third-party-free system …
Advantages of using fog in IoT applications
AAA Sen, M Yamin - International Journal of Information Technology, 2021 - Springer
Edge computing (EC) has emerged as an attractive and interesting topic for research. It is an
extension of cloud computing, used for non-centralized computing with various new features …
extension of cloud computing, used for non-centralized computing with various new features …
A trajectory privacy-preserving scheme based on transition matrix and caching for IIoT
With the increasing integration of location-based services (LBSs) into various societal
domains, location privacy preservation has emerged as a pivotal concern. In most …
domains, location privacy preservation has emerged as a pivotal concern. In most …
A new method with swapping of peers and fogs to protect user privacy in IoT applications
M Yamin, AA Abi Sen - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is now serving as a vehicle to a huge number of applications,
resulting in innovative and smart solutions in many fields. While providing abundant benefits …
resulting in innovative and smart solutions in many fields. While providing abundant benefits …
On the privacy protection of indoor location dataset using anonymization
Indoor positioning is becoming more popular with increasing user demands on Location-
based Services (LBS) and Social Networking Services (SNS). Location fingerprinting is …
based Services (LBS) and Social Networking Services (SNS). Location fingerprinting is …
Tokens shuffling approach for privacy, security, and reliability in IoHT under a pandemic
Privacy and security are unavoidable challenges in the future of smart health services and
systems. Several approaches for preserving privacy have been provided in the Internet of …
systems. Several approaches for preserving privacy have been provided in the Internet of …
An experimental comparison of RSSI-based indoor localization techniques using ZigBee technology
Wireless indoor localization is a significant challenge because of the noise generated by
building structures, electromagnetic fields, and distances between connected nodes inside a …
building structures, electromagnetic fields, and distances between connected nodes inside a …
Current security and privacy issues, and concerns of Internet of Things (IoT) and Cloud Computing: A review
PD Thushari - 2022 International Conference on Computing …, 2022 - ieeexplore.ieee.org
Emerging technologies for instance such as Cloud Computing and Internet of Things (IoT)
have revolutionized the usage of technology in crucial trades and sectors in a remarkable …
have revolutionized the usage of technology in crucial trades and sectors in a remarkable …
An adaptive social-aware device-to-device communication mechanism for wireless networks
Abstract Device-to-Device (D2D) communication is an essential element in 5G networks and
beyond. It enables users to communicate either directly without network assistance or with …
beyond. It enables users to communicate either directly without network assistance or with …
A differential privacy‐preserving deep learning caching framework for heterogeneous communication network systems
H Wang, X Zhang, Y Xia, X Wu - International Journal of …, 2022 - Wiley Online Library
Caching and artificial intelligence technology are means to improve the content transmission
rate and solve the delay problem in heterogeneous communication networks, which provide …
rate and solve the delay problem in heterogeneous communication networks, which provide …