Acknowledgement
This work has been supported by Islamic University of Madina grant Takamul-109. Any opinion, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of supported by the Islamic University in Medina or other research sponsors.
References
- S. S. Albouq, A. A. A. Sen, A. Namoun, N. M. Bahbouh, A. B. Alkhodre, and A. Alshanqiti, "A Double Obfuscation Approach for Protecting the Privacy of IoT Location Based Applications," IEEE Access, vol. 8, pp. 129415-129431, 2020, doi: 10.1109/ACCESS.2020.3009200.
- X. Jia, Q. Feng, T. Fan, and Q. Lei, "RFID technology and its applications in Internet of Things (IoT)," in 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), Apr. 2012, pp. 1282-1285. doi: 10.1109/CECNet.2012.6201508.
- Kandris, D., Nakas, C., Vomvas, D., & Koulouras, G. (2020). Applications of wireless sensor networks: an up-to-date survey. Applied System Innovation, 3(1), 14.
- Y. Chen and Q. Zhao, "On the lifetime of wireless sensor networks," IEEE Commun. Lett., vol. 9, no. 11, pp. 976-978, Nov. 2005, doi: 10.1109/LCOMM.2005.11010.
- [C. M. Ramya, M. Shanmugaraj, and R. Prabakaran, "Study on ZigBee technology," in 2011 3rd International Conference on Electronics Computer Technology, Apr. 2011, vol. 6, pp. 297-301. doi: 10.1109/ICECTECH.2011.5942102.
- J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, "A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications," IEEE Internet Things J., vol. 4, no. 5, pp. 1125-1142, Oct. 2017, doi: 10.1109/JIOT.2017.2683200.
- T. Dillon, C. Wu, and E. Chang, "Cloud Computing: Issues and Challenges," in 2010 24th IEEE International Conference on Advanced Information Networking and Applications, Apr. 2010, pp. 27-33. doi: 10.1109/AINA.2010.187.
- A. Khan, "What is the relationship between Cloud Computing and Service Orientated Architecture (SOA)?," Welcome to Khan's Blog, Jul. 13, 2015.https://arsalankhan.com/2015/07/13/relationship-between-cloud-computing-and-soa/ (accessed Nov. 27, 2021).
- "Fog Computing vs. Cloud Computing: Key Differences | SaMSolutions," Sep. 10, 2019. https://www.sam-solutions.com:443/blog/fog-computing-vs-cloud-computing-for-iot-projects/ (accessed Nov. 27, 2021).
- A. A. A. Sen and A. M. Basahel, "A Comparative Study between Security and Privacy," in 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), Mar. 2019, pp. 1282-1286.
- C. Bettini, S. Jajodia, and L. Pareschi, "Anonymity and Diversity in LBS: A Preliminary Investigation," in Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), Mar. 2007, pp. 577-580. doi: 10.1109/PERCOMW.2007.23.
- E. Elabd, "Enhanced peer-to-peer anonymity approach for privacy preserving in location-based services," J. Locat. Based Serv., vol. 14, no. 4, pp. 252-267, Oct. 2020, doi: 10.1080/17489725.2020.1844326.
- B. Palanisamy and L. Liu, "MobiMix: Protecting location privacy with mix-zones over road networks," in 2011 IEEE 27th International Conference on Data Engineering, Apr. 2011, pp. 494-505. doi: 10.1109/ICDE.2011.5767898.
- N. Guo, L. Ma, and T. Gao, "Independent Mix Zone for Location Privacy in Vehicular Networks," IEEE Access, vol. 6, pp. 16842-16850, 2018, doi: 10.1109/ACCESS.2018.2800907.
- H. Kido, Y. Yanagisawa, and T. Satoh, "An anonymous communication technique using dummies for location-based services," in ICPS '05. Proceedings. International Conference on Pervasive Services, 2005., Jul. 2005, pp. 88-97. doi: 10.1109/PERSER.2005.1506394.
- B. Niu, Q. Li, X. Zhu, G. Cao, and H. Li, "Achieving k-anonymity in privacy-aware location-based services," in IEEE INFOCOM 2014 - IEEE Conference on Computer Communications, Apr. 2014, pp. 754-762. doi: 10.1109/INFOCOM.2014.6848002.
- P. Jagwani and S. Kaushik, "Secure Cloaking Area Based on User Profile Similarity," Int. J. Eng. Technol., vol. 8, no. 6, pp. 458-461, 2016, doi: 10.7763/IJET.2016.V8.933.
- M. L. Damiani, E. Bertino, and C. Silvestri, "Protecting Location Privacy through Semantics-aware Obfuscation Techniques," in Trust Management II, vol. 263, Y. Karabulut, J. Mitchell, P. Herrmann, and C. D. Jensen, Eds. Boston, MA: Springer US, 2008, pp. 231-245. doi: 10.1007/978-0-387-09428-1_15.
- M. Yamin and A. Abi Sen, "Improving Privacy and Security of User Data in Location Based Services," Int. J. Ambient Comput. Intell., vol. 9, pp. 19-42, Jan. 2018, doi: 10.4018/IJACI.2018010102.
- A. A. A. Sen, F. B. Eassa, M. Yamin, and K. Jambi, "Double Cache Approach with Wireless Technology for Preserving User Privacy," Wirel. Commun. Mob. Comput., vol. 2018, p. e4607464, Aug. 2018, doi: 10.1155/2018/4607464.
- Y. Alsaawy, A. Alkhodre, A. Ahmed, A. Abi Sen, and M. S. Siddiqui, "Swap Obfuscation Technique for Preserving Privacy of LBS," Jun. 2019.Nguyen B Truong, Gyu Myoung Lee, and Yacine Ghamri-Doudane. Software defined networking-based vehicular adhoc network with fog computing. In 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), pages 1202-1207. Ieee, 2015.
- Tawalbeh, L. A., Muheidat, F., Tawalbeh, M., & Quwaider, M. (2020). IoT Privacy and security: Challenges and solutions. Applied Sciences, 10(12), 4102. 23
- Sen, A., Ahmed, A., Eassa, F. A., Jambi, K., & Yamin, M. (2018). Preserving privacy in internet of things: a survey. International Journal of Information Technology, 10(2), 189- 200. 24 ] ] https://doi.org/10.1007/s41870-018-0113-4
- Zaeem, R. N., & Barber, K. S. (2020). The effect of the GDPR on privacy policies: Recent progress and future promise. ACM Transactions on Management Information Systems (TMIS), 12(1), 1-20.