What is it about?

This article talks about the main data anonymization techniques used on the Internet of Things. It lists the positive and negative points of the anonymization techniques found in the literature.

Featured Image

Why is it important?

The paper presents an overview of the main anonymization techniques used to anonymize data generated by IoT devices.

Perspectives

This publication presents the pros and cons of the anonymization techniques, thus presenting starting points for future research.

Flavio Neves

Read the Original

This page is a summary of: Data privacy in the Internet of Things based on anonymization: A review, Journal of Computer Security, May 2023, IOS Press,
DOI: 10.3233/jcs-210089.
You can read the full text:

Read

Contributors

The following have contributed to this page