2020 IEEE 19th International Symposium on Network Computing and Applications (NCA) 2020
DOI: 10.1109/nca51143.2020.9306709
|View full text |Cite
|
Sign up to set email alerts
|

Transformation Based Routing Overlay for Privacy and Reusability in Multi-Domain IoT

Abstract: The Internet of Things (IoT) interconnects a large collection of low power devices to the Internet. Instead of relying on the usual approach where IoT devices push their data to a cloud, we envision a decentralized approach, where multiple IoT domains cooperate to exchange data safely. As privacy is critical regarding IoT data, each domain should define what it accepts to export. We propose to create a multi-domain overlay of border routers, defining their own privacy constraints. Border routers export their a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 20 publications
0
3
0
Order By: Relevance
“…Recently, NDN has received a lot of attention in the research community. Some researchers attempt to optimize and modify routing in different network topologies such as Internet of Thing (IoT) networks, 15,16 software define networking (SDN) networks, [17][18][19] wireless networks, 20 vehicular ad hoc networks (VANETs), 21,22 and mobile ad hoc networks (MANETs). 23 Others try to optimize routing by using different mechanisms such as bloom filtering (BF) 24 and congestion control.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, NDN has received a lot of attention in the research community. Some researchers attempt to optimize and modify routing in different network topologies such as Internet of Thing (IoT) networks, 15,16 software define networking (SDN) networks, [17][18][19] wireless networks, 20 vehicular ad hoc networks (VANETs), 21,22 and mobile ad hoc networks (MANETs). 23 Others try to optimize routing by using different mechanisms such as bloom filtering (BF) 24 and congestion control.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, producers specify its minimum requirement level for its privacy [13]. Thus, the producer can be certain that its individual measurements are not divulged to hosts apart from its direct peers, and enables k-anonymity.…”
Section: Note That It Also Work With Any Discretization Function Relying On An Arbitrary Grainmentioning
confidence: 99%
“…We evaluate the ability of our solution to reduce the network load thanks to aggregation [13]. In particular, we rely on the The unaggregated solution relies on an independent collection of unmodified individual data streams transformed at the consumers.…”
Section: A Evaluation Setupmentioning
confidence: 99%