Proceedings of the 8th International Conference on Cloud Computing and Services Science 2018
DOI: 10.5220/0006591500270034
|View full text |Cite
|
Sign up to set email alerts
|

Utilising the Tor Network for IoT Addressing and Connectivity

Abstract: For Internet of Things (IoT) devices and cyber-physical systems (CPS), it is required to connect them securely and reliably to some form of cloud environment or computing entity for control, management and utilisation. The Internet is a suitable, standardized, and proven means for the connection of IoT devices in various scenarios. Connection over the Internet utilises existing protocols, standards, technologies and avoids investment in new, specialised concepts. Thereby, this connection requires a transparent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Without anonymous routing, any higher-layer protection would be useless as users could be identified by IP addresses (or patterns in communication, content, etc.). Fortunately, there are already solutions [21], [22] that can be used even on constrained resources and achieve anonymous communication channels. However, the privacyenhancing technologies for managing user identity and/or personal attributes, are not yet available on platforms with limited resources.…”
Section: A State Of the Artmentioning
confidence: 99%
“…Without anonymous routing, any higher-layer protection would be useless as users could be identified by IP addresses (or patterns in communication, content, etc.). Fortunately, there are already solutions [21], [22] that can be used even on constrained resources and achieve anonymous communication channels. However, the privacyenhancing technologies for managing user identity and/or personal attributes, are not yet available on platforms with limited resources.…”
Section: A State Of the Artmentioning
confidence: 99%
“…Since the birth of the anonymous network, the research on its security about the simulation platform has never stopped [9][10][11][12][13][14][15]. For example, [16] proposes a method for connecting IoT devices in a clientserver configuration to utilize the Tor network for addressing and secure communication between IoT and CPS devices. Reference [17] introduces a new approach to exploiting Tor's anonymous communication to handle distributed attacks against smart devices on the Internet and demonstrates the effectiveness of Tor in IoT devices.…”
Section: Introductionmentioning
confidence: 99%