What is it about?
This article talks about the main data anonymization techniques used on the Internet of Things. It lists the positive and negative points of the anonymization techniques found in the literature.
Featured Image
Why is it important?
The paper presents an overview of the main anonymization techniques used to anonymize data generated by IoT devices.
Perspectives
Read the Original
This page is a summary of: Data privacy in the Internet of Things based on anonymization: A review, Journal of Computer Security, May 2023, IOS Press,
DOI: 10.3233/jcs-210089.
You can read the full text:
Contributors
The following have contributed to this page