2019
DOI: 10.1007/978-3-030-36938-5_5
|View full text |Cite
|
Sign up to set email alerts
|

A Privacy-Enhancing Framework for Internet of Things Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(10 citation statements)
references
References 58 publications
0
7
0
Order By: Relevance
“…Also, in addition to the application of trust evaluation for the IoT, machine learning techniques have become a powerful tool with research on security or privacy issues in the IoT environment [42]. For example, federated learning was used on edge devices to reduce the computational overhead of IoT devices in [39], and privacy was also considered when edge devices collect data from IoT devices [40]. In [41], reinforcement learning was adopted to determine the offloading strategy for healthcare IoT devices to protect location privacy and usage pattern privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Also, in addition to the application of trust evaluation for the IoT, machine learning techniques have become a powerful tool with research on security or privacy issues in the IoT environment [42]. For example, federated learning was used on edge devices to reduce the computational overhead of IoT devices in [39], and privacy was also considered when edge devices collect data from IoT devices [40]. In [41], reinforcement learning was adopted to determine the offloading strategy for healthcare IoT devices to protect location privacy and usage pattern privacy.…”
Section: Related Workmentioning
confidence: 99%
“…The verifier of the signature can only verify whether the signature comes from the signature set or not, but does not know who signed it. Therefore, the ring signature scheme [9][10][11][12] has correctness, unforgeability and unconditional anonymity.…”
Section: Introductionmentioning
confidence: 99%
“…There are, in the current bibliography, many comprehensive studies about applying security frameworks to secure communications in the IoT, i.e. [16], [17], or [18]. And in particular, about MQTT communications, applying cryptographic schemes, [19], [20] or [21].…”
Section: Introductionmentioning
confidence: 99%