2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM) 2018
DOI: 10.1109/wincom.2018.8629719
|View full text |Cite
|
Sign up to set email alerts
|

Per Packet Flow Anonymization in 6LoWPAN IoT Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…This work limited the time available to an attacker performing reconnaissance attacks and provided power consumption analysis to prove the efficacy of their micro MTD mechanism. [13] proposed an MTD technique to provide anonymization of packet flow for IoT devices. They looked into privacy issues caused by tracking and communicationflow identification in current low power solutions.…”
Section: Mtd and Defensive Deception Techniques For Iotmentioning
confidence: 99%
“…This work limited the time available to an attacker performing reconnaissance attacks and provided power consumption analysis to prove the efficacy of their micro MTD mechanism. [13] proposed an MTD technique to provide anonymization of packet flow for IoT devices. They looked into privacy issues caused by tracking and communicationflow identification in current low power solutions.…”
Section: Mtd and Defensive Deception Techniques For Iotmentioning
confidence: 99%