2020 International Conference on ICT for Smart Society (ICISS) 2020
DOI: 10.1109/iciss50791.2020.9307568
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Attack On IoT: a Systematic Literature Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 91 publications
0
1
0
Order By: Relevance
“…Another privacy attacks survey [116] investigated the attacks against the machine learning approach using the taxonomy of attacks. Other works mainly focused on one specific privacy attack method or one specific attack field, such as the de-anonymization of graph data [51], social network attacks [121], IoT attacks [163], blockchain attacks [15] and location privacy attacks [148]. After several years of theoretical and practical development, new privacy attacking methods keep emerging, and some are also followed with innovative defense methods [170,136].However, despite the aforementioned work, form the lens of privacy attacks, no recent comprehensive review is available with a rigorous review of privacy preservation and attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Another privacy attacks survey [116] investigated the attacks against the machine learning approach using the taxonomy of attacks. Other works mainly focused on one specific privacy attack method or one specific attack field, such as the de-anonymization of graph data [51], social network attacks [121], IoT attacks [163], blockchain attacks [15] and location privacy attacks [148]. After several years of theoretical and practical development, new privacy attacking methods keep emerging, and some are also followed with innovative defense methods [170,136].However, despite the aforementioned work, form the lens of privacy attacks, no recent comprehensive review is available with a rigorous review of privacy preservation and attacks.…”
Section: Introductionmentioning
confidence: 99%