Sensor security and location privacy
Abstract
This chapter highlights security and location privacy requirements and concerns that exist in mobile computing systems. It also mentions few techniques to address these requirements and concerns.
Keywords
Sensor security; encryption scheme; secret sharing scheme; sliding group watermark scheme; forward watermark chain; location privacy; k-anonymity; obfuscation; cloaking
• Sensor Attacks
• Security of Sensor Data
• Preserving Location Privacy
• k-Anonymity
• Obfuscation
• Cloaking
Introduction to Mobile Computing Security and Privacy
A mobile computing device can be used in a variety of environments and for a variety of use cases. For example, it can be used as a cell phone ...
Get Mobile Sensors and Context-Aware Computing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.