2020
DOI: 10.1007/978-3-030-39875-0_30
|View full text |Cite
|
Sign up to set email alerts
|

Privacy Threat Model for IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Total privacy weight P is calculated using Eq. (6). In this equation, N e (D i ) is the number of data or data packages (D i ) that use higher-level security mode, and N n (D i ) is the number of data or data packages that use lower-level security mode.…”
Section: Related Work and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…Total privacy weight P is calculated using Eq. (6). In this equation, N e (D i ) is the number of data or data packages (D i ) that use higher-level security mode, and N n (D i ) is the number of data or data packages that use lower-level security mode.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…IoT applications like smart city, smart healthcare systems, smart building, smart transport and smart environment [3], industrial, agriculture, supply chain management [4], smart B Shelendra Kumar Jain shelendra23@hotmail.com 1 Department of Computer Science, Central University of Rajasthan, NH-8, Bandar Sindri, Dist-Ajmer, Rajasthan 305817, India retail, location-based services, etc. may deal with sensitive data such as health information, financial information [5], location footprints, Personally Identifiable Information (PII) [6], data of personal life, etc. Data deluge from billions of entities producing information is a significant threat to privacy [7] (Fig.…”
Section: Introductionmentioning
confidence: 99%