2020
DOI: 10.1109/access.2020.2976614
|View full text |Cite
|
Sign up to set email alerts
|

Participant Selection Strategy With Privacy Protection for Internet of Things Search

Abstract: Nowadays, with the rapid developments of the Internet of Things, the information on physical entities has shown explosive growth. The emergence of Internet of Things search technology has facilitated the storage, organization, and management of massive entity information. Aiming at the issues of security and privacy and the target to obtain the optimal perceiving results by selecting participants to ensure the quality of service of the IoT platform, this paper proposes a participant selection strategy with pri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…For example, Yang et al. [ 29 ] propose a Participant Selection Strategy With Privacy Protection (PSSPP) for IoT search. It provides anonymity and blind mechanisms for end-users and requests at query time, along with privacy and identity management.…”
Section: Proposed System: Irwot Architecturementioning
confidence: 99%
See 1 more Smart Citation
“…For example, Yang et al. [ 29 ] propose a Participant Selection Strategy With Privacy Protection (PSSPP) for IoT search. It provides anonymity and blind mechanisms for end-users and requests at query time, along with privacy and identity management.…”
Section: Proposed System: Irwot Architecturementioning
confidence: 99%
“…Since 2020, we have recognized significant efforts to cover security, privacy, and trust in IoTSE/WoTSE approaches and critical scenarios. For example, Yang et al [29] propose a Participant Selection Strategy With Privacy Protection (PSSPP) for IoT search. It provides anonymity and blind mechanisms for end-users and requests at query time, along with privacy and identity management.…”
Section: Evolutionary Directions and Engineeringmentioning
confidence: 99%