Comparison among Cooperation, Anonymity and Cloak Area approaches for Preserving Privacy of IoT | IEEE Conference Publication | IEEE Xplore