[PDF][PDF] Optimization of the Energy Consumption of Connected Objects.

M Moutaib, A Tarik, M Fattah, Y Farhaoui… - Int. J. Interact. Mob …, 2021 - academia.edu
The IoT is a growing new approach that has been defined as a global network of devices
and machines capable of reliably communicating with each other without human …

Enabling smart anonymity scheme for security collaborative enhancement in location-based services

H Wu, M Li, H Zhang - IEEE Access, 2019 - ieeexplore.ieee.org
Security enhancement is and always will be a prime concern for the deployment of point-of-
interest (POI) recommendation services in mobile sensing environment. Recent tamper …

A hybrid opportunistic IoT secure routing strategy based on node intimacy and trust value

L Yu, G Xu, ZF Wang, N Zhang… - Security and …, 2022 - Wiley Online Library
Routing strategy is one of the most important researches in Opportunistic Internet of Things
(IoT), and it highly influences the efficiency of data transmission. In this paper, a hybrid …

Two-stage privacy-preserving mechanism for a crowdsensing-based VSN

H Li, D Liao, G Sun, M Zhang, D Xu, Z Han - IEEE Access, 2018 - ieeexplore.ieee.org
Vehicular social networks (VSNs) are moving from infancy to maturity. However, the
characteristics of wireless channel availability and the high mobility of vehicles in the VSNs …

The ethical issues of location-based services on big data and IoT

V Chang, Y Mou, QA Xu - Modern Industrial IoT, Big Data and Supply …, 2021 - Springer
Abstract Both Internet of Things (IoT) and big data are hot topics in recent years. They
indeed have brought about the change of business, promoted the progress of science and …

Location, context, and social objectives using knowledge-based rules and conflict resolution for security in internet of things

MB Krishna, P Lorenz - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Security and knowledge systems effectively identify the node behavior based on device
identity, location, social attributes, and networking parameters. In this article, we propose a …

An improved decomposition-based multiobjective evolutionary algorithm for IoT service

ZY Chai, SS Fang, YL Li - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) aims to provide ubiquitous services in real life. When different service
requests arrive, how to assign them to proper service providers has become a challenging …

DSPPTD: Dynamic scheme for privacy protection of trajectory data in LBS

AK Gupta, S Kumar - Role of Data-Intensive Distributed Computing …, 2023 - Springer
The current trajectory privacy policies primarily focus on the sequence of location in
trajectory and depend extensively on manually crafted procedures. Thus, the initial trajectory …

Exploring the Challenges and Tensions of Privacy Using Internet of Things (IoT) and Cloud Technologies

AR Alamro, UM Ibrahem, TM Alsaif - Wireless Personal Communications, 2023 - Springer
Abstract The Internet of Things (IoT) is a global system of networked physical devices that
will play a significant part in the next generation of the web (FI). More than 50 billion gadgets …

An efficient dummy-based location privacy-preserving scheme for internet of things services

Y Du, G Cai, X Zhang, T Liu, J Jiang - Information, 2019 - mdpi.com
With the rapid development of GPS-equipped smart mobile devices and mobile computing,
location-based services (LBS) are increasing in popularity in the Internet of Things (IoT) …