A Caching-Based Dual K-Anonymous Location Privacy-Preserving Scheme for Edge Computing

S Zhang, B Hu, W Liang, KC Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Location-based services have become prevalent and the risk of location privacy leakage
increases. Most existing schemes use third-party-based or third-party-free system …

Advantages of using fog in IoT applications

AAA Sen, M Yamin - International Journal of Information Technology, 2021 - Springer
Edge computing (EC) has emerged as an attractive and interesting topic for research. It is an
extension of cloud computing, used for non-centralized computing with various new features …

A trajectory privacy-preserving scheme based on transition matrix and caching for IIoT

S Zhang, B Hu, W Liang, KC Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
With the increasing integration of location-based services (LBSs) into various societal
domains, location privacy preservation has emerged as a pivotal concern. In most …

A new method with swapping of peers and fogs to protect user privacy in IoT applications

M Yamin, AA Abi Sen - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is now serving as a vehicle to a huge number of applications,
resulting in innovative and smart solutions in many fields. While providing abundant benefits …

On the privacy protection of indoor location dataset using anonymization

A Fathalizadeh, V Moghtadaiee, M Alishahi - Computers & Security, 2022 - Elsevier
Indoor positioning is becoming more popular with increasing user demands on Location-
based Services (LBS) and Social Networking Services (SNS). Location fingerprinting is …

Tokens shuffling approach for privacy, security, and reliability in IoHT under a pandemic

N Bahbouh, A Basahel, S Sendra, AA Abi Sen - Applied Sciences, 2022 - mdpi.com
Privacy and security are unavoidable challenges in the future of smart health services and
systems. Several approaches for preserving privacy have been provided in the Internet of …

An experimental comparison of RSSI-based indoor localization techniques using ZigBee technology

HS Fahama, K Ansari-Asl, YS Kavian… - IEEE Access, 2023 - ieeexplore.ieee.org
Wireless indoor localization is a significant challenge because of the noise generated by
building structures, electromagnetic fields, and distances between connected nodes inside a …

Current security and privacy issues, and concerns of Internet of Things (IoT) and Cloud Computing: A review

PD Thushari - 2022 International Conference on Computing …, 2022 - ieeexplore.ieee.org
Emerging technologies for instance such as Cloud Computing and Internet of Things (IoT)
have revolutionized the usage of technology in crucial trades and sectors in a remarkable …

An adaptive social-aware device-to-device communication mechanism for wireless networks

FZ Alden, S Hassan, A Habbal, X Wei - Ad Hoc Networks, 2022 - Elsevier
Abstract Device-to-Device (D2D) communication is an essential element in 5G networks and
beyond. It enables users to communicate either directly without network assistance or with …

A differential privacy‐preserving deep learning caching framework for heterogeneous communication network systems

H Wang, X Zhang, Y Xia, X Wu - International Journal of …, 2022 - Wiley Online Library
Caching and artificial intelligence technology are means to improve the content transmission
rate and solve the delay problem in heterogeneous communication networks, which provide …