Secure Computing Protocols for Internet of Things Data Fusion Based on Set Intersection and Union Against Malicious Enemies.
Xin LiuRuxue WangLu PengDan LuoGang XuXiu-Bo ChenNeal XiongXiaomeng LiuPublished in: IEEE Internet Things J. (2024)
Keyphrases
- data fusion
- set intersection
- semi honest
- information fusion
- multi sensor
- multi source
- fusion algorithm
- multi sensor data fusion
- cryptographic protocols
- key distribution
- multiple sensors
- security protocols
- authentication protocol
- fusion process
- global consistency
- fusion method
- constraint networks
- mobile devices
- key agreement protocol
- source selection
- image fusion
- fusion methods
- situation assessment
- wireless sensor networks