Smart home: Keeping privacy based on Air-Padding

[1]  Riccardo Bettati,et al.  Analytical and empirical analysis of countermeasures to traffic analysis attacks , 2003, 2003 International Conference on Parallel Processing, 2003. Proceedings..

[2]  Andrzej Duda,et al.  Markov chain fingerprinting to classify encrypted traffic , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[3]  Ran Dubin,et al.  I Know What You Saw Last Minute—Encrypted HTTP Adaptive Video Streaming Title Classification , 2016, IEEE Transactions on Information Forensics and Security.

[4]  Nick Feamster,et al.  Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping , 2018, Proc. Priv. Enhancing Technol..

[5]  Karl N. Levitt,et al.  Is Anybody Home? Inferring Activity From Smart Home Network Traffic , 2016, 2016 IEEE Security and Privacy Workshops (SPW).

[6]  Yong Liao,et al.  SAMPLES: Self Adaptive Mining of Persistent LExical Snippets for Classifying Mobile Application Traffic , 2015, MobiCom.

[7]  Wei Wang,et al.  Dependent link padding algorithms for low latency anonymity systems , 2008, CCS.

[8]  Shingo Ata,et al.  Identification of communication devices from analysis of traffic patterns , 2017, 2017 13th International Conference on Network and Service Management (CNSM).

[9]  Thomas Ristenpart,et al.  Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.

[10]  Vitaly Shmatikov,et al.  Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.

[11]  Narseo Vallina-Rodriguez,et al.  An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps , 2016, Internet Measurement Conference.

[12]  Richard Chow,et al.  The Last Mile for IoT Privacy , 2017, IEEE Security & Privacy.

[13]  Jiu-Ru Wang,et al.  A research of fine-grained encryption method for IoT , 2012 .

[14]  Hwajeong Seo,et al.  ZigBee security for Home automation using attribute-based cryptography , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).

[15]  Sanjay Kumar Jena,et al.  WDTF: A Technique for Wireless Device Type Fingerprinting , 2017, Wirel. Pers. Commun..

[16]  Ahmad-Reza Sadeghi,et al.  IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[17]  Yong Ho Hwang IoT Security & Privacy: Threats and Challenges , 2015, IoTPTS@AsiaCCS.

[18]  Hui Liu,et al.  Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices , 2017, IoT S&P@CCS.

[19]  Claudio Soriente,et al.  User Profiling in the Time of HTTPS , 2016, Internet Measurement Conference.

[20]  Nino Vincenzo Verde,et al.  Analyzing Android Encrypted Network Traffic to Identify User Actions , 2016, IEEE Transactions on Information Forensics and Security.

[21]  Bernardo A. Huberman,et al.  Ensuring Trust and Security in the Industrial IoT , 2016, Ubiquity.

[22]  Jasleen Kaur,et al.  Can Android Applications Be Identified Using Only TCP/IP Headers of Their Launch Time Traffic? , 2016, WISEC.

[23]  Nick Feamster,et al.  A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation , 2018, IoT S&P@SIGCOMM.

[24]  Marc Joye,et al.  Privacy and security: Key requirements for sustainable IoT growth , 2017, 2017 Symposium on VLSI Technology.