{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:27:13Z","timestamp":1742938033564,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030440374"},{"type":"electronic","value":"9783030440381"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44038-1_48","type":"book-chapter","created":{"date-parts":[[2020,3,30]],"date-time":"2020-03-30T09:04:07Z","timestamp":1585559047000},"page":"526-534","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Your Neighbor Knows What You\u2019re Doing: Defending Smart Home IoT Device Traffic from Privacy LAN Attacks"],"prefix":"10.1007","author":[{"given":"Kiana","family":"Dziubinski","sequence":"first","affiliation":[]},{"given":"Masaki","family":"Bandai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,31]]},"reference":[{"key":"48_CR1","unstructured":"Newman, P.: IoT report: how Internet of Things technology growth is reaching mainstream companies and consumers, January 2019. www.businessinsider.com\/internet-of-things-report"},{"key":"48_CR2","unstructured":"Acar, A., Fereidooni, H., Abera, T., Sikder, A., Miettinen, M., Aksu, H., Conti, M., Sadeghi, A., Uluagac, A.: Peek-a-Boo: I see your smart home activities, even encrypted!, August 2018. arXiv preprint: arXiv:1808.02741"},{"key":"48_CR3","doi-asserted-by":"crossref","unstructured":"Srinivasan, V., Stankovic, J., Whitehouse, K.: Protecting your daily in-home activity information from a wireless snooping attack. In: ACM International Conference on Ubiquitous Computing, pp. 202\u2013211, September 2008","DOI":"10.1145\/1409635.1409663"},{"key":"48_CR4","unstructured":"Lars, N.: Connected medical devices, apps: are they leading the IoT revolution - or vice versa (2014). https:\/\/www.wired.com\/insights\/2014\/06\/connected-medical-devices-apps-leading-iot-revolution-vice-versa\/"},{"key":"48_CR5","unstructured":"Kravets, D.: Sex toys and the internet of things collide - what could go wrong? (2016). https:\/\/arstechnica.com\/tech-policy\/2016\/09\/sex-toys-and-the-internet-of-things-collide-what-could-go-wrong\/"},{"key":"48_CR6","doi-asserted-by":"crossref","unstructured":"Choe, E.K., Consolvo, S., Jung, J., Harrison, B., Kientz, J.A.: Living in a glass house: a survey of private moments in the home. In: ACM International Conference on Ubiquitous Computing, pp. 41\u201344, September 2011","DOI":"10.1145\/2030112.2030118"},{"key":"48_CR7","doi-asserted-by":"crossref","unstructured":"Schiefer, M.: Smart home definition and security threats. In: International Conference on IT Security Incident Management & IT Forensics, pp. 114\u2013118, May 2015","DOI":"10.1109\/IMF.2015.17"},{"issue":"16","key":"48_CR8","doi-asserted-by":"publisher","first-page":"3821","DOI":"10.1002\/sec.1569","volume":"9","author":"K Xu","year":"2016","unstructured":"Xu, K., Wang, F., Jia, X.: Secure the Internet, one home at a time. Secur. Commun. Netw. 9(16), 3821\u20133832 (2016)","journal-title":"Secur. Commun. Netw."},{"issue":"4","key":"48_CR9","doi-asserted-by":"publisher","first-page":"2483","DOI":"10.1109\/JIOT.2017.2767291","volume":"5","author":"M Frustaci","year":"2018","unstructured":"Frustaci, M., Pace, P., Aloi, G., Fortino, G.: Evaluating critical security issues of the IoT world: present and future challenges. IEEE Internet Things J. 5(4), 2483\u20132495 (2018)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"48_CR10","doi-asserted-by":"publisher","first-page":"3453","DOI":"10.1109\/COMST.2018.2855563","volume":"20","author":"I Stellios","year":"2018","unstructured":"Stellios, I., Kotzanikolaou, P., Psarakis, M., Alcaraz, C., Lopez, J.: A survey of IoT-enabled cyberattacks: assessing attack paths to critical infrastructures and services. IEEE Commun. Surv. Tutor. 20(4), 3453\u20133495 (2018)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"48_CR11","unstructured":"Apthorpe, N., Reisman, D., Sundaresan, S., Narayanan, A., Feamster, N.: Spying on the smart home: privacy attacks and defenses on encrypted IoT traffic, August 2017. arXiv preprint: arXiv:1708.05044"},{"key":"48_CR12","doi-asserted-by":"crossref","unstructured":"Apthorpe, N., Huang, D., Reisman, D., Narayanan, A., Feamster, N.: Keeping the smart home private with smart(er) IoT traffic shaping, March 2019. arXiv preprint: arXiv:1812.00955","DOI":"10.2478\/popets-2019-0040"},{"key":"48_CR13","unstructured":"Apthorpe, N., Reisman, D., Feamster, N., Fereidooni, H.: Closing the blinds: four strategies for protecting smart home privacy from network observers, May 2017. arXiv preprint: arXiv:1705.06809"},{"issue":"9","key":"48_CR14","doi-asserted-by":"publisher","first-page":"16235","DOI":"10.3390\/s140916235","volume":"14","author":"H Park","year":"2014","unstructured":"Park, H., Basaran, C., Park, T., Son, S.H.: Energy-efficient privacy protection for smart home environments using behavioral semantics. Sens. (Basel) 14(9), 16235\u201316257 (2014)","journal-title":"Sens. (Basel)"},{"key":"48_CR15","doi-asserted-by":"crossref","unstructured":"Miettinen, M., Sadeghi, A., Marchal, S., Asokan, N., Hafeez, I., Tarkoma, S.: IoT SENTINEL: automated device-type identification for security enforcement in IoT. In: IEEE International Conference on Distributed Computing Systems (ICDCS), pp. 2177\u20132184, June 2017","DOI":"10.1109\/ICDCS.2017.283"},{"key":"48_CR16","doi-asserted-by":"crossref","unstructured":"Vanhoef, M., Matte, C., Cunche, M., Cardoso, L., Piessens, F.: Why MAC address randomization is not enough: an analysis of wi-fi network discovery mechanisms. In: ASIA Conference on Computer and Communications Security, pp. 413\u2013424, May 2016","DOI":"10.1145\/2897845.2897883"},{"key":"48_CR17","unstructured":"hostapd (2019). https:\/\/w1.fi\/hostapd\/"},{"key":"48_CR18","unstructured":"Wireshark (2019). https:\/\/www.wireshark.org"}],"container-title":["Advances in Intelligent Systems and Computing","Web, Artificial Intelligence and Network Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44038-1_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T20:20:46Z","timestamp":1669321246000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-44038-1_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030440374","9783030440381"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44038-1_48","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"31 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WAINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Workshops of  the International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Caserta","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"waina0a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}