Research Article

Protect Mobile Travelers Information in Sensitive Region Based on Fuzzy Logic in IoT Technology

Figure 1

After the partition of the k-anonymity region (sensitive region).