{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:30:11Z","timestamp":1754155811146,"version":"3.41.2"},"reference-count":17,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T00:00:00Z","timestamp":1496620800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJPCC"],"published-print":{"date-parts":[[2017,6,5]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The purpose of this paper is to detect the existence of unknown wireless devices which could result negative means to the privacy. The perceptual layer of internet of things (IoTs) suffers the most significant privacy disclosing because of limited hardware resources, huge quantity and wide varieties of sensing equipment. Determining whether there are unknown wireless devices in the communicating environment is an effective method to implement the privacy protection for the perceptual layer of IoTs.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>The authors use horizontal hierarchy slicing (HHS) algorithm to extract the morphology feature of signals. Meanwhile, partitioning around medoids algorithm is used to cluster the HHS curves and agglomerative hierarchical clustering algorithm is utilized to distinguish final results. Link quality indicator (LQI) data are chosen as the network parameters in this research.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>Nowadays data encryption and anonymization are the most common methods to protect private information for the perceptual layer of IoTs. However, these efforts are ineffective to avoid privacy disclosure if the communication environment exists unknown wireless nodes which could be malicious devices. How to detect these unknown wireless devices in the communication environment is a valuable topic in the further research.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>The authors derive an innovative and passive unknown wireless devices detection method based on the mathematical morphology and machine learning algorithms to detect the existence of unknown wireless devices which could result negative means to the privacy. The simulation results show their effectiveness in privacy protection.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ijpcc-03-2017-0025","type":"journal-article","created":{"date-parts":[[2017,5,26]],"date-time":"2017-05-26T07:24:29Z","timestamp":1495783469000},"page":"194-210","source":"Crossref","is-referenced-by-count":1,"title":["A passive method for privacy protection in the perceptual layer of IoTs"],"prefix":"10.1108","volume":"13","author":[{"given":"Xiaoyu","family":"Li","sequence":"first","affiliation":[]},{"given":"Osamu","family":"Yoshie","sequence":"additional","affiliation":[]},{"given":"Daoping","family":"Huang","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020120702482101200_ref001","first-page":"312","article-title":"Data link layer security protocols in Wireless Sensor Networks: a survey","volume-title":"IEEE International Conference on Networking, Sensing and Control","year":"2013"},{"issue":"15","key":"key2020120702482101200_ref002","first-page":"2787","article-title":"The internet of things: a survey","volume":"54","year":"2010","journal-title":"Journal of Computer and Telecommunications Networking"},{"volume-title":"Functional and Operatorial Statistics","year":"2008","article-title":"Measuring dissimilarity between curves by means of their granulometric size distributions","key":"key2020120702482101200_ref003"},{"issue":"4","key":"key2020120702482101200_ref004","first-page":"34","article-title":"Radio link quality estimation in wireless sensor networks: a survey","volume":"8","year":"2012","journal-title":"ACM Transactions on Sensor Networks"},{"issue":"6","key":"key2020120702482101200_ref005","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1109\/MIC.2009.120","article-title":"Perci: pervasive service interaction with the internet of things","volume":"13","year":"2009","journal-title":"Journal of Internet Computing"},{"issue":"9","key":"key2020120702482101200_ref006","doi-asserted-by":"crossref","first-page":"1824","DOI":"10.1016\/j.solener.2011.04.023","article-title":"A morphological clustering method for daily solar radiation curves","volume":"85","year":"2011","journal-title":"Solar Energy"},{"issue":"4","key":"key2020120702482101200_ref007","doi-asserted-by":"crossref","first-page":"720","DOI":"10.3923\/itj.2014.720.724","article-title":"A link quality evaluation model based on the three-dimensional space in wireless sensor network","volume":"13","year":"2014","journal-title":"Information Technology Journal"},{"issue":"8","key":"key2020120702482101200_ref008","doi-asserted-by":"crossref","first-page":"1001","DOI":"10.1080\/00949651003596099","article-title":"Using mathematical morphology for unsupervised classification of functional data","volume":"81","year":"2011","journal-title":"Journal of Statistical Computation and Simulation"},{"issue":"11","key":"key2020120702482101200_ref009","article-title":"An overview of cluster analysis based on particle swarm optimization","volume":"13","year":"2016","journal-title":"Journal of Computational and Theoretical Nanoscience"},{"issue":"2","key":"key2020120702482101200_ref010","first-page":"37","article-title":"Data-driven link quality prediction using link features","volume":"10","year":"2014","journal-title":"ACM Transactions on Sensor Networks"},{"key":"key2020120702482101200_ref011","first-page":"189","article-title":"SPINS: security Protocols for Sensor Networks","volume-title":"International Conference on Mobile Computing and Networking","year":"2002"},{"issue":"2","key":"key2020120702482101200_ref012","first-page":"536","article-title":"Image analysis and mathematical morphology","volume":"39","year":"1983","journal-title":"Journal of Mathematical Imaging and Vision"},{"issue":"3","key":"key2020120702482101200_ref013","first-page":"800","article-title":"Morphological image analysis: principles and applications","volume":"28","year":"2003","journal-title":"Sensor Review"},{"issue":"9","key":"key2020120702482101200_ref014","article-title":"Neighbor-based malicious node detection in wireless sensor networks","volume":"4","year":"2012","journal-title":"Journal of Wireless Sensor Network"},{"issue":"4","key":"key2020120702482101200_ref015","doi-asserted-by":"crossref","first-page":"2122","DOI":"10.1109\/TIE.2013.2264785","article-title":"Item-level indoor localization with passive UHF RFID based on tag interaction analysis","volume":"61","year":"2014","journal-title":"IEEE Transactions on Industrial Electronics"},{"unstructured":"\u201cBerkeley\u201d, available at: http:\/\/webs.cs.berkeley.edu (accessed 20 December 2016).","key":"key2020120702482101200_ref016"},{"unstructured":"\u201cXbow\u201d, available at: www.xbow.com (accessed 6 August 2016).","key":"key2020120702482101200_ref017"}],"container-title":["International Journal of Pervasive Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-03-2017-0025\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/IJPCC-03-2017-0025\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:05:18Z","timestamp":1753394718000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ijpcc\/article\/13\/2\/194-210\/161410"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,5]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6,5]]}},"alternative-id":["10.1108\/IJPCC-03-2017-0025"],"URL":"https:\/\/doi.org\/10.1108\/ijpcc-03-2017-0025","relation":{},"ISSN":["1742-7371"],"issn-type":[{"type":"print","value":"1742-7371"}],"subject":[],"published":{"date-parts":[[2017,6,5]]}}}