2019 IEEE 13th International Symposium on Embedded Multicore/Many-Core Systems-on-Chip (MCSoC) 2019
DOI: 10.1109/mcsoc.2019.00025
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Content-Based Anonymization Edge Router on NetFPGA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
2

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…Content‐based anonymization hardware was proposed in Ref. [18]. The proposed hardware maintains network transparency and anonymizes packets according to their destination IP addresses and port numbers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Content‐based anonymization hardware was proposed in Ref. [18]. The proposed hardware maintains network transparency and anonymizes packets according to their destination IP addresses and port numbers.…”
Section: Related Workmentioning
confidence: 99%
“…A network‐transparent content‐based anonymization module that uses information, such as IP addresses, port numbers, and fixed‐position information in packet bodies to identify and anonymize content was proposed in Ref. [18]. This architecture is applied to the implementation.…”
Section: Transparent Fpga Context Migrationmentioning
confidence: 99%
“…In network applications, FPGAs have become popular because their pipelined architecture is efficient for processing network streams. For example, FPGA implementations of TCP/IP stacks with line‐rate support for 10G Ethernet, have been proposed for deployment in data centers [6] and implementations of anonymizing hardware for encapsulating personal information in edge computing environments [7].…”
Section: Objectives Of Hardware‐based Mqtt Brokermentioning
confidence: 99%
“…While IP address anonymization is well understood [16], [17], [25] and significant related work exists in the area of network traffic anonymization, most approaches focus on packet traces. A wide variety of approaches to trace anonymization have been developed, both in software [13], [14], [26]- [32], and in hardware [25], [33], [34], although many of these approaches are now defunct. While some implementations focus on appliance and service logs [35]- [39], these approaches are typically quite destructive as they are intended for broad sharing.…”
Section: Related Workmentioning
confidence: 99%