2019 IEEE 27th International Conference on Network Protocols (ICNP) 2019
DOI: 10.1109/icnp.2019.8888033
|View full text |Cite
|
Sign up to set email alerts
|

Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
21
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(21 citation statements)
references
References 37 publications
0
21
0
Order By: Relevance
“…All experiments are conducted on a PC with a CPU 2.30 GHz, 8 GB of RAM. We compare the anonymous performance of our lightweight anonymous communication model with several existing anonymous models [8,36,19] in Table 2. It can be seen from Table 2 that only our model achieves all the anonymities, whereas the other models cannot.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…All experiments are conducted on a PC with a CPU 2.30 GHz, 8 GB of RAM. We compare the anonymous performance of our lightweight anonymous communication model with several existing anonymous models [8,36,19] in Table 2. It can be seen from Table 2 that only our model achieves all the anonymities, whereas the other models cannot.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…All experiments are conducted on a PC with a CPU 2.30 GHz, 8 GB of RAM. We compare the anonymous performance of our lightweight anonymous communication model with several existing anonymous models [8,19,36] in Table 2. It can be seen from Table 2 that only our model achieves all the anonymities, whereas the other models cannot.…”
Section: Experiments and Resultsmentioning
confidence: 99%
“…The idea of onion routing has been extended to all directions. Hiller et al used onion routing in the Internet of Things to protect the private sensitive information of data owners [8]. Raza uses onion routing to implement a distributed search engine [9].…”
mentioning
confidence: 99%
“…This is still considered an open issue in the general case of constrained IoT devices (see, e.g. [20]), making such approach infeasible in practice in the short term.…”
Section: Anonymous Communication Protocolmentioning
confidence: 99%