81
Views
3
CrossRef citations to date
0
Altmetric
Articles

Anonymization: Securing privacy in IoT

&

References

  • Au, M. H., & Choo, K.-K. R. (2017). Chapter 1 – Mobile security and privacy. In M. H. Au & K.-K. R. Choo (Eds.), Mobile security and privacy: Advances, challenges and future research directions (pp. 1–4). Boston: Syngress. https://doi.org/10.1016/B978-0-12-804629-6.00001-8.
  • Ashish Joshi & Amar Kumar Mohapatra (2019) Authentication protocols for wireless body area network with key management approach, Journal of Discrete Mathematical Sciences and Cryptography, 22:2, 219–240, DOI: 10.1080/09720529.2019.1582869
  • C. Dwork, “Differential privacy: A survey of results,” in International Conference on Theory and Application Models of Computation, Springer 2008, pp 1-19.
  • C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” in TCC, vol. 3876. Springer,2006, pp. 265–284.
  • J. L. H. Ramos, J. B. Bernabé, and A. F. Skarmeta, “Towards privacy preserving data sharing in smart environments,” in Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2014 Eighth International Conference on. IEEE, 2014, pp. 334–339.
  • Kamalanathan Chandran, Sunita Panda & Bhaskara Sreenivas (2020) An efficient secure authentication scheme for personalized healthcare system, Journal of Interdisciplinary Mathematics, 23:1, 215-227, DOI: 10.1080/09720502.2020.1721714
  • L. Sweeney, “k-anonymity: A model for protecting privacy,” International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 05, pp. 557–570, 2002. doi: 10.1142/S0218488502001648
  • L. Sweeney, “Simple demographics often identify people uniquely,” Health (San Francisco), vol. 671, pp. 1–34, 2000
  • Raggo, M. T., & Raggo, M. T. (2016). Chapter 3 – Mobile security countermeasures. In Mobile data loss (pp. 17–28). Boston: Syngress. https://doi.org/10.1016/B978-0-12-802864-3.00003-9.
  • Sarvesh Tanwar & Anil Kumar (2019) An efficient and secure identity based multiple signatures scheme based on RSA, Journal of Discrete Mathematical Sciences and Cryptography, 22:6, 953-971, DOI: 10.1080/09720529.2019.1632024
  • Stojkoska, B.L.R., Trivodaliev, K.V.: A review of Internet of Things for smart home: challenges and solutions. J. Clean. Prod. 140, 1454– 1464 (2016) In the age of big data,” IEEE access, vol. 4, pp. 2751–2763, 2016. doi: 10.1016/j.jclepro.2016.10.006
  • Tully, S., & Mohanraj, Y. (2017). Chapter 2 – Mobile security: A practitioner’s perspective. In Mobile security and privacy (pp. 5–55). Boston: Syngress. https://doi.org/10.1016/B978-0-12-804629-6.00002-X.
  • Webpage of Wikipedia. https://en.wikipedia.org/wiki/Machine_to_machine. Last accessed 2018/12/20.
  • R. Hall, A. Rinaldo, and L. Wasserman, “Differential Privacy for Functions and Functional Data,” Journal of Machine Learning Research, 2013, pp.703-727.
  • Razafimandimby, C., Loscri, V., & Vegni, A. M. (2016, April). A neural network and IoT based scheme for performance assessment in internet of robotic things. In 2016 IEEE first international conference on internet-of-things design and implementation (IoTDI) (pp. 241-246). IEEE.
  • Ying Wang, Jian He, Hao Zhao, Yao-Hui Han & Xiao-Jiang Huang (2018) Intelligent community medical service based on internet of things, Journal of Interdisciplinary Mathematics, 21:5, 1121-1126, DOI:10.1080/09720502.2018.14930

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.