A passive means based privacy protection method for the perceptual layer of IoTs
Abstract
References
Index Terms
- A passive means based privacy protection method for the perceptual layer of IoTs
Recommendations
IoT Security & Privacy: Threats and Challenges
IoTPTS '15: Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and SecurityThe era of the Internet of Things (IoT) has already started and it will profoundly change our way of life. While IoT provides us many valuable benefits, IoT also exposes us to many different types of security threats in our daily life. Before the advent ...
Research on privacy protection system of RFID personal consumption data based on internet of things and cloud computing
Internet of things and cloud computing have caused the subversion of traditional concepts in sociology, law and ethics. In order to improve the privacy protection level of personal consumption data, the internet of things and cloud computing are used to ...
Location privacy protection of nodes in the perception layer of the Internet of things based on Radio Frequency Identification location aware algorithm
AbstractTo ensure the security of node location privacy in the perception layer of the Internet of Things, this study proposes a location privacy protection method based on RFID location awareness algorithm. This method first introduces an adaptive ...
Comments
Information & Contributors
Information
Published In

Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 43Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in