2019
DOI: 10.1016/j.comcom.2018.11.003
|View full text |Cite
|
Sign up to set email alerts
|

EXCHANge: Securing IoT via channel anonymity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…The deployment of KaFHCa implies the evaluation of the trade-off between performing transmissions or executing a cryptographic primitive to generate a new secret shared key. This problem has been addressed many times in the literature [8]- [10], [13] highlighting that leaning towards either crypto or crypto-less protocols depends on several factors, e.g., the availability of elliptic curve crypto functions that require less power from the battery. KaFHCa has a significant advantage in all the scenarios characterized by low-powered CPU and a small amount of memory without very strict battery…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The deployment of KaFHCa implies the evaluation of the trade-off between performing transmissions or executing a cryptographic primitive to generate a new secret shared key. This problem has been addressed many times in the literature [8]- [10], [13] highlighting that leaning towards either crypto or crypto-less protocols depends on several factors, e.g., the availability of elliptic curve crypto functions that require less power from the battery. KaFHCa has a significant advantage in all the scenarios characterized by low-powered CPU and a small amount of memory without very strict battery…”
Section: Discussionmentioning
confidence: 99%
“…A solution to the aforementioned problem has already been proposed in [8], by randomly modulating the transmission power, thus making the guessing of the distance from the RSS probabilistic (and unlikely). The solution [8] is extended to a networkwide deployment in [9], and is then implemented in [10]. The core idea, namely COKE, relies on exchanging plain-text messages between two nodes.…”
Section: Introductionmentioning
confidence: 99%
“…If the eavesdropper cannot associate the signal to the source, it does not know whether to complement the bit value. This scheme was designed for pairs of users and has been extended in [33] to suit a network-wide environment.…”
Section: A Signal Source Indistinguishability Approachesmentioning
confidence: 99%
“…The experiment first groups the captured traffic data according to IP which must be the routing nodes of the Tor to obtain valuable packet information. In the experiment, after the traffic data is obtained, it only needs to request and respond to the packet size as it 6 Security and Communication Networks (1) class Filter{ (2) public: //Defines the storage server IP address; server ips (3) unordered set <string> server ips; //Defines the storage client IP address: client ips (4) unordered set <string> client ips; //Defines the maximum port that needs to be processed (5) int PROXYPORT MIN; //Defines the minimum port that needs to be processed (6) int PROXYPORT MAX; (7) public: //FilterConstructor (8) Filter(char * clientipfname, char * serveripfname, int portmin, int portmax); //Read the IP function (9) int read ips(unordered set<string>&set, char * fname); //Determines whether the file loads the function (10) bool is onload(u char * payload); //Determine whether the traffic function is listening (11) bool is monitoredtraffic(char * src, unsigned int sport, char * dst, unsigned int dport); //Implement the transformation function for the data (12) RETparse one(char * capfname, int proxy port min, intproxy port max, int remove ack, char * monitoredoutname, char * localoutname, char * c2stau, char * s2ctau, char * timeseq); (13) }; contains more complex data. Therefore, the original data needs to be processed.…”
Section: Msfa Scheme Module Designmentioning
confidence: 99%
“…The anonymous dataset generated by the algorithm can effectively protect the sensitive information of IoT under the premise of ensuring the availability of the data. The EXCHANge protocol [4], a cryptoless over-the-air key establishment multiround protocol based on sender/receiver anonymity, was specifically conceived to secure IoT networks based on the IEEE 802.15.4 communication technology. Network malicious attackers or criminals rarely attack directly through their own computers.…”
Section: Introductionmentioning
confidence: 99%