Research Article

A Clustering -Anonymity Privacy-Preserving Method for Wearable IoT Devices

Figure 3

An overview of the threat model.