Proceedings of the Computing Frontiers Conference 2017
DOI: 10.1145/3075564.3079068
|View full text |Cite
|
Sign up to set email alerts
|

Private inter-network routing for Wireless Sensor Networks and the Internet of Things

Abstract: Access to the full text of the published version may require a subscription. Rights ABSTRACTAs computing becomes increasingly pervasive, di erent heterogeneous networks are connected and integrated. is is especially true in the Internet of ings (IoT) and Wireless Sensor Networks (WSN) se ings. However, as di erent networks managed by di erent parties and with di erent security requirements are integrated, security becomes a primary concern. WSN nodes, in particular, are o en deployed "in the open", where a po… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
4

Relationship

5
4

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 18 publications
0
11
0
Order By: Relevance
“…In Figure 1 we provide the results of an experiment where multiple word lengths are used over the same test dataset. For this experiment, we store 255 sets each containing 256 elements, for a total of 65280 elements in a filter of length 2 23 bits. As the two figures clearly depict, a small word value (2 10 ) significantly increases the number of errors returned by the filter (a formal definition of such errors is provided in the following).…”
Section: Shifting Bloom Filtermentioning
confidence: 99%
“…In Figure 1 we provide the results of an experiment where multiple word lengths are used over the same test dataset. For this experiment, we store 255 sets each containing 256 elements, for a total of 65280 elements in a filter of length 2 23 bits. As the two figures clearly depict, a small word value (2 10 ) significantly increases the number of errors returned by the filter (a formal definition of such errors is provided in the following).…”
Section: Shifting Bloom Filtermentioning
confidence: 99%
“…Part of the results of this article were previously presented by the authors in a shorter version at the International Workshop on Malicious Software and Hardware in the Internet of Things, co-located with Computing Frontiers 2017 [17]. The proposed construction is targeted at preserving context privacy within a network composed of a number of interconnected subetworks.…”
Section: Contributionmentioning
confidence: 99%
“…In this paper we introduce a novel anonymous routing mechanism, based on the spatial Bloom filter data structure and homomorphic encryption. Part of the results of this article were previously presented by the authors in a shorter version at the International Workshop on Malicious Software and Hardware in the Internet of Things, co-located with Computing Frontiers 2017 [17]. The proposed construction is targeted at preserving context privacy within a network composed of a number of interconnected subetworks.…”
Section: Contributionmentioning
confidence: 99%