Shadow attacks on users' anonymity in pervasive computing environments
Pervasive and Mobile Computing
Agent-oriented privacy-based information brokering architecture for healthcare environments
International Journal of Telemedicine and Applications - Special issue on electronic health
Evaluating user-centered privacy model (UPM) in pervasive computing systems
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Trust-based authentication scheme with user rating for low-resource devices in smart environments
Personal and Ubiquitous Computing
Hi-index | 0.00 |
In this paper, we present two techniques. The first technique called Privacy Sensitive Information dilUting Mechanism (PSIUM) is able to prevent the misuse of data by a service provider by using a mixture of true and false sensor data. The second technique protects privacy sensitive information from being revealed to an attacker through traffic analysis by using a combination of frequently changing pseudonyms and dummy traffic.