Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments
暂无分享,去创建一个
Martin Henze | Jens Hiller | Jan Pennekamp | Andriy Panchenko | Klaus Wehrle | Markus Dahlmanns | J. Pennekamp | Martin Henze | Jens Hiller | A. Panchenko | M. Dahlmanns | Klaus Wehrle
[1] Nasir D. Memon,et al. Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis , 2017, NDSS.
[2] Martin Henze,et al. Accounting for Privacy in the Cloud Computing Landscape , 2018 .
[3] Franklin Heath. LPWA Technology Security Comparison A White Paper from Franklin Heath Ltd , 2017 .
[4] Other Contributors Are Indicated Where They Contribute. The Eclipse Foundation , 2017 .
[5] Reijo Savola,et al. Mitigating IoT security threats with a trusted Network element , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).
[6] Georg Carle,et al. DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.
[7] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[8] George Danezis,et al. A Survey of Anonymous Communication Channels , 2008 .
[9] Sylvia Ratnasamy,et al. Droplet: Decentralized Authorization for IoT Data Streams , 2018, ArXiv.
[10] Earlence Fernandes,et al. Security Analysis of Emerging Smart Home Applications , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[11] Klaus Wehrle,et al. Website Fingerprinting at Internet Scale , 2016, NDSS.
[12] Ian Goldberg,et al. Changing of the guards: a framework for understanding and improving entry guard selection in tor , 2012, WPES '12.
[13] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[14] Yanina Protskaya,et al. An anonymization protocol for the Internet of Things , 2017, 2017 International Symposium on Wireless Communication Systems (ISWCS).
[15] Yi Zhou,et al. Understanding the Mirai Botnet , 2017, USENIX Security Symposium.
[16] Andriy Panchenko,et al. Multipathing Traffic to Reduce Entry Node Exposure in Onion Routing , 2019, 2019 IEEE 27th International Conference on Network Protocols (ICNP).
[17] Micah Sherr,et al. Users get routed: traffic correlation on tor by realistic adversaries , 2013, CCS.
[18] Ahmed Nait-Sidi-Moh,et al. Using Internet of Things Technologies for a Collaborative Supply Chain: Application to Tracking of Pallets and Containers , 2015, FNC/MobiSPC.
[19] Riccardo Bonetto,et al. Secure communication for smart IoT objects: Protocol stacks, use cases and practical examples , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[20] Jorge Sá Silva,et al. End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication , 2013, 2013 IFIP Networking Conference.
[21] Abhishek Javali,et al. IoT based localization and tracking , 2017, 2017 International Conference on IoT and Application (ICIOT).
[22] R. K. Bunkar,et al. Data Security and Privacy Protection Issues in Cloud Computing , 2014 .
[23] Bryan Ford,et al. Peer-to-Peer Communication Across Network Address Translators , 2005, USENIX Annual Technical Conference, General Track.
[24] Klaus Wehrle,et al. Distributed Configuration, Authorization and Management in the Cloud-Based Internet of Things , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.
[25] Prabal Dutta,et al. The Internet of Things Has a Gateway Problem , 2015, HotMobile.
[26] N. B. Anuar,et al. The rise of "big data" on cloud computing: Review and open research issues , 2015, Inf. Syst..
[27] Haw-Yun Shin,et al. The Study and Application of the IoT in Pet Systems , 2013, IOT 2013.
[28] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[29] Sebastian Hudert,et al. Utilising the Tor Network for IoT Addressing and Connectivity , 2018, CLOSER.
[30] Tao Wang,et al. Effective Attacks and Provable Defenses for Website Fingerprinting , 2014, USENIX Security Symposium.
[31] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[32] Ian Goldberg,et al. Improving Tor using a TCP-over-DTLS Tunnel , 2009, USENIX Security Symposium.
[33] Óscar García-Morchón,et al. End-to-End Transport Security in the IP-Based Internet of Things , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).
[34] Lei Yang,et al. Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways , 2018, ESORICS.
[35] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[36] Siarhei Kuryla,et al. RPL: IPv6 Routing Protocol for Low power and Lossy Networks , 2010 .
[37] Jürgen Schönwälder,et al. Management of resource constrained devices in the internet of things , 2012, IEEE Communications Magazine.
[38] Klaus Wehrle,et al. Delegation-based authentication and authorization for the IP-based Internet of Things , 2014, 2014 Eleventh Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
[39] U Moeller,et al. Mixmaster Protocol Version 2 , 2004 .
[40] Alex Biryukov,et al. Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization , 2013, 2013 IEEE Symposium on Security and Privacy.
[41] Klaus Wehrle,et al. Towards In-Network Security for Smart Homes , 2018, ARES.
[42] Klaus Wehrle,et al. CloudAnalyzer: Uncovering the Cloud Usage of Mobile Apps , 2017, MobiQuitous.
[43] Nick Feamster,et al. Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic , 2017, ArXiv.
[44] David E. Culler,et al. JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT , 2019, USENIX Security Symposium.
[45] Dave Levin,et al. Ting: Measuring and Exploiting Latencies Between All Tor Nodes , 2015, Internet Measurement Conference.
[46] Christian Brecher,et al. Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective , 2019, CPS-SPC@CCS.
[47] Ludwig Seitz,et al. S3K: Scalable Security With Symmetric Keys—DTLS Key Establishment for the Internet of Things , 2016, IEEE Transactions on Automation Science and Engineering.
[48] Klaus Wehrle,et al. Analysis of Fingerprinting Techniques for Tor Hidden Services , 2017, WPES@CCS.
[49] Christian Brecher,et al. Towards an Infrastructure Enabling the Internet of Production , 2019, 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS).
[50] Brijesh Joshi,et al. Touching from a distance: website fingerprinting attacks and defenses , 2012, CCS.
[51] Wu He,et al. Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.
[52] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[53] Hanno Wirtz,et al. Tailoring end-to-end IP security protocols to the Internet of Things , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).
[54] Peter Palfrader,et al. Mixmaster protocol --- version 2 , 2000 .
[55] Nick Feamster,et al. A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic , 2017, ArXiv.