2018
DOI: 10.1016/j.fcij.2017.11.004
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-preserving data aggregation in resource-constrained sensor nodes in Internet of Things: A review

Abstract: Privacy problems are lethal and getting more attention than any other issue with the notion of the Internet of Things (IoT). Since IoT has many application areas including smart home, smart grids, smart healthcare system, smart and intelligent transportation and many more. Most of these applications are fueled by the resource-constrained sensor network, such as Smart healthcare system is powered by Wireless Body Area Network (WBAN) and Smart home and weather monitoring systems are fueled by Wireless Sensor Net… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 18 publications
0
10
0
Order By: Relevance
“…In IoT, several existing privacy preservation mechanisms of data aggregation fall in different categories like anonymity based privacy preservation [45], encryption based privacy preservation [90]. The design of IoMT based privacy preserved scheme with significant data utility still a critical challenge for future research [91].…”
Section: B Privacy Of Data For Information Exchangementioning
confidence: 99%
“…In IoT, several existing privacy preservation mechanisms of data aggregation fall in different categories like anonymity based privacy preservation [45], encryption based privacy preservation [90]. The design of IoMT based privacy preserved scheme with significant data utility still a critical challenge for future research [91].…”
Section: B Privacy Of Data For Information Exchangementioning
confidence: 99%
“…A comprehensive survey of artificial intelligence-based classification for edge intelligence was presented in [17]. A review of privacy preservation mechanisms for resource-oriented sensors in IoT was investigated in [18]. The influence of IoT in healthcare globally was proposed in [19] with the new transformative computing in progress, different types of signals acquired for IoT seconds, data processing between sensors and users poses a significant threat in healthcare data analytics concerning response time.…”
Section: Related Workmentioning
confidence: 99%
“…Computation Cost, Privacy level and Privacy against aggregator IoT sensor node [10]. Computational Cost (CC): It is the evaluation of algorithm in terms of complexity of mathematical iterations used.…”
Section: Comparative Analysismentioning
confidence: 99%