Location Privacy Protection for the Internet of Things with Edge Computing Based on Clustering K-Anonymity

Today's article comes from the journal of Sensors. The authors are Jiang et al., from the Nanjing Institute of Technology. This paper introduces a new variant of an algorithmic technique that IoT devices use to obscure their location. But, none of this will make any sense without heaps of context, so I’m going to spend a lot of time on that. Then we'll look at how this new technique fits in and what it does differently. Alright, let’s get into it.

DOI: 10.3390/s24186153

Book
Book

Members Only

You must be an active Journal Club member to access this content. If you're already a member, click the blue button to login. If you're not a member yet, click the sign-up button to get started.

Login to My Account Sign Up