[1]
L. Atzori, A. Iera and G. Morabito: The Internet of Things: A survey. Computer Networks, 54(15), 2010, 2787-2805.
DOI: 10.1016/j.comnet.2010.05.010
Google Scholar
[2]
R.H. Weber: Internet of Things: New security and privacy challenges. Computer Law and Security Report, 26(1), 2010, 23-30.
DOI: 10.1016/j.clsr.2009.11.008
Google Scholar
[3]
S. Babar, P. Mahalle and A. Stango: Proposed security model and threat taxonomy for the Internet of Things. Communications in Computer and Information Science, 89(2), 2010, 420-429.
DOI: 10.1007/978-3-642-14478-3_42
Google Scholar
[4]
S. Elahia: Privacy and consent in the digital era. Information Security Technical Report, 14(3), 2009, 113-118.
DOI: 10.1016/j.istr.2009.10.004
Google Scholar
[5]
V. Oleshchuk: Internet of Things and privacy preserving technologies. In Proceedings of the 1st International Conference on Wireless Communication, 2009, 336-340.
DOI: 10.1109/wirelessvitae.2009.5172470
Google Scholar
[6]
I. Gudymenko, K. Borcea-Pfitzmann and K. Tietze: Privacy implications of the internet of things. Communications in Computer and Information Science, 277, 280-286, (2012).
DOI: 10.1007/978-3-642-31479-7_48
Google Scholar
[7]
M. Elkhodr, S. Shahrestani and H. Cheung: A review of mobile location privacy in the Internet of Things. In Proceedings of the International Conference on ICT and Knowledge Engineering, 2012, 266-272.
DOI: 10.1109/ictke.2012.6408566
Google Scholar
[8]
J. Schrammel, C. Hochleitner and M. Tscheligi: Privacy, trust and interaction in the Internet of Thing. LNCS 7040, 2011, 378-379.
Google Scholar
[9]
N.H. Li, N. Zhang, S.K. Das, B. Thuraisingham: Privacy preservation in wireless sensor networks: A state-of-the-art survey.Ad hoc Networks, 7( 8), 2009, 1501-1514.
DOI: 10.1016/j.adhoc.2009.04.009
Google Scholar
[10]
L. Sweeney: K-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, 10(5) , 2002, 557-570.
DOI: 10.1142/s0218488502001648
Google Scholar
[11]
A.C. Yao: How to Generate and Exchange Secrets. In Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, 1986, 162-167.
DOI: 10.1109/sfcs.1986.25
Google Scholar
[12]
C.Y. Chow, M.F. Mokbel and W.G. Aref: Casper*: Query processing for location services without compromising privacy.ACM Transactions on Database Systems, 34(4) , 2009, 1-24.
DOI: 10.1145/1620585.1620591
Google Scholar
[13]
P.H. Wang: Survey on privacy preserving data mining. International Journal of Digital Content Technology and its Applications, 4(9), 2010, 1-7.
Google Scholar