Research Article

A Clustering -Anonymity Privacy-Preserving Method for Wearable IoT Devices

Figure 2

A general view of the link attack.