{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:54:18Z","timestamp":1743090858236,"version":"3.40.3"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030588601"},{"type":"electronic","value":"9783030588618"}],"license":[{"start":{"date-parts":[[2020,9,6]],"date-time":"2020-09-06T00:00:00Z","timestamp":1599350400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,6]],"date-time":"2020-09-06T00:00:00Z","timestamp":1599350400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-58861-8_3","type":"book-chapter","created":{"date-parts":[[2020,9,5]],"date-time":"2020-09-05T18:03:29Z","timestamp":1599329009000},"page":"33-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Communication-Flow Privacy-Preservation in 6LoWPANs-Based IoT Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7934-2115","authenticated-orcid":false,"given":"Asma Iman","family":"Kouachi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5160-9412","authenticated-orcid":false,"given":"Abdelmalik","family":"Bachir","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,6]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-030-18732-3_8","volume-title":"Digital Twin Technologies and Smart Cities","author":"HF Atlam","year":"2020","unstructured":"Atlam, H.F., Wills, G.B.: IoT security, privacy, safety and ethics. In: Farsi, M., Daneshkhah, A., Hosseinian-Far, A., Jahankhani, H. (eds.) Digital Twin Technologies and Smart Cities, pp. 123\u2013149. Springer, Cham (2020)"},{"doi-asserted-by":"crossref","unstructured":"Brilli, L., Pecorella, T., Pierucci, L., Fantacci, R.: A novel 6LoWPAN-ND extension to enhance privacy in IEEE 802.15.4 networks. In: 2016 IEEE Global Communications Conference (GLOBECOM), pp.\u00a01\u20136. IEEE (2016)","key":"3_CR2","DOI":"10.1109\/GLOCOM.2016.7841523"},{"doi-asserted-by":"crossref","unstructured":"Bugeja, J., Jacobsson, A., Davidsson, P.: On privacy and security challenges in smart connected homes. In: 2016 European Intelligence and Security Informatics Conference (EISIC), pp. 172\u2013175. IEEE (2016)","key":"3_CR3","DOI":"10.1109\/EISIC.2016.044"},{"doi-asserted-by":"crossref","unstructured":"Conti, M., Dehghantanha, A., Franke, K., Watson, S.: Internet of Things security and forensics: challenges and opportunities (2018)","key":"3_CR4","DOI":"10.1016\/j.future.2017.07.060"},{"issue":"4","key":"3_CR5","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","volume":"10","author":"L Da Xu","year":"2014","unstructured":"Da Xu, L., He, W., Li, S.: Internet of Things in industries: a survey. IEEE Trans. Ind. Inform. 10(4), 2233\u20132243 (2014)","journal-title":"IEEE Trans. Ind. Inform."},{"doi-asserted-by":"crossref","unstructured":"Dos\u00a0Santos, J., Hennebert, C., Fonbonne, J., Lauradoux, C.: Ephemeral: lightweight pseudonyms for 6LoWPAN MAC addresses. In: IEEE PIMRC (2016)","key":"3_CR6","DOI":"10.1109\/PIMRC.2016.7794800"},{"doi-asserted-by":"crossref","unstructured":"Dunlop, M., Groat, S., Urbanski, W., Marchany, R., Tront, J.: MT6D: a moving target IPv6 defense. In: MILCOM 2011 - 2011 Military Communications Conference, pp. 1321\u20131326. IEEE (2011)","key":"3_CR7","DOI":"10.1109\/MILCOM.2011.6127486"},{"unstructured":"Tails Foundation: Tails-Privacy for anyone anywhere (2019). \nhttps:\/\/tails.boum.org\/index.en.html\n\n. Accessed Nov 2019","key":"3_CR8"},{"issue":"2","key":"3_CR9","doi-asserted-by":"publisher","first-page":"1054","DOI":"10.1109\/COMST.2017.2649687","volume":"19","author":"M Haus","year":"2017","unstructured":"Haus, M., Waqas, M., Ding, A.Y., Li, Y., Tarkoma, S., Ott, J.: Security and privacy in Device-to-Device (D2D) communication: a review. IEEE Commun. Surv. Tutor. 19(2), 1054\u20131079 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"5","key":"3_CR10","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/JIOT.2014.2359538","volume":"1","author":"C Hennebert","year":"2014","unstructured":"Hennebert, C., Dos Santos, J.: Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J. 1(5), 384\u2013398 (2014)","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"3_CR11","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1109\/JIOT.2014.2359538","volume":"1","author":"C Hennebert","year":"2014","unstructured":"Hennebert, C., Santos, J.D.: Security protocols and privacy issues into 6LoWPAN stack: a synthesis. IEEE Internet Things J. 1(5), 384\u2013398 (2014). \nhttps:\/\/doi.org\/10.1109\/JIOT.2014.2359538","journal-title":"IEEE Internet Things J."},{"doi-asserted-by":"crossref","unstructured":"Hiller, J., Pennekamp, J., Dahlmanns, M., Henze, M., Panchenko, A., Wehrle, K.: Tailoring onion routing to the Internet of Things: security and privacy in untrusted environments. In: 2019 IEEE 27th International Conference on Network Protocols (ICNP), pp. 1\u201312. IEEE (2019)","key":"3_CR12","DOI":"10.1109\/ICNP.2019.8888033"},{"doi-asserted-by":"crossref","unstructured":"Hoang, N.P., Pishva, D.: A TOR-based anonymous communication approach to secure smart home appliances. In: 2015 17th International Conference on Advanced Communication Technology (ICACT), pp. 517\u2013525. IEEE (2015)","key":"3_CR13","DOI":"10.1109\/ICACT.2015.7224918"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1016\/j.future.2017.11.020","volume":"82","author":"M Hossain","year":"2018","unstructured":"Hossain, M., Islam, S.R., Ali, F., Kwak, K.S., Hasan, R.: An Internet of Things-based health prescription assistant and its security system design. Future Gener. Comput. Syst. 82, 422\u2013439 (2018)","journal-title":"Future Gener. Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"Kouachi, A.I., Sahraoui, S., Bachir, A.: Per packet flow anonymization in 6LoWPAN IoT networks. In: 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), pp.\u00a01\u20137. IEEE (2018)","key":"3_CR15","DOI":"10.1109\/WINCOM.2018.8629719"},{"doi-asserted-by":"crossref","unstructured":"Kusek, M.: Internet of Things: today and tomorrow. In: 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp. 0335\u20130338. IEEE (2018)","key":"3_CR16","DOI":"10.23919\/MIPRO.2018.8400064"},{"doi-asserted-by":"crossref","unstructured":"Kwak, B.O., Chung, T.S.: Trust domain based trustworthy networking. In: 2017 International Conference on Information and Communication Technology Convergence (ICTC), pp. 1247\u20131259. IEEE (2017)","key":"3_CR17","DOI":"10.1109\/ICTC.2017.8190911"},{"unstructured":"Lee, T., Pappas, C., Szalachowski, P., Perrig, A.: Communication based on per-packet one-time addresses. In: 2016 IEEE 24th International Conference on Network Protocols (ICNP), pp. 1\u201310. IEEE (2016)","key":"3_CR18"},{"doi-asserted-by":"crossref","unstructured":"Loukil, F., Ghedira-Guegan, C., Benharkat, A.N., Boukadi, K., Maamar, Z.: Privacy-aware in the IoT applications: a systematic literature review. In: OTM Confederated International Conferences \u201cOn the Move to Meaningful Internet Systems\u201d, pp. 552\u2013569. Springer (2017)","key":"3_CR19","DOI":"10.1007\/978-3-319-69462-7_35"},{"doi-asserted-by":"crossref","unstructured":"Malandrino, D., Petta, A., Scarano, V., Serra, L., Spinelli, R., Krishnamurthy, B.: Privacy awareness about information leakage: Who knows what about me? In: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society. pp. 279\u2013284 (2013)","key":"3_CR20","DOI":"10.1145\/2517840.2517868"},{"key":"3_CR21","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.adhoc.2018.06.010","volume":"79","author":"M Mavani","year":"2018","unstructured":"Mavani, M., Asawa, K.: Privacy enabled disjoint and dynamic address auto-configuration protocol for 6LoWPAN. Ad Hoc Netw. 79, 72\u201386 (2018)","journal-title":"Ad Hoc Netw."},{"key":"3_CR22","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/s12083-019-00792-6","volume":"13","author":"M Mavani","year":"2019","unstructured":"Mavani, M., Asawa, K.: Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses. Peer-to-Peer Netw. Appl. 13, 333\u2013347 (2019)","journal-title":"Peer-to-Peer Netw. Appl."},{"doi-asserted-by":"crossref","unstructured":"Narten, T., Simpson, W.A., Nordmark, E., Soliman, H.: Neighbor discovery for IPversion 6 (IPv6). RFC 4861 (2007)","key":"3_CR23","DOI":"10.17487\/rfc4861"},{"unstructured":"Protskaya, Y.: Security in the Internet of Things. Ph.D. thesis, Universit\u00e0 degli Studi di Parma. Dipartimento di Ingegneria e architettura (2020)","key":"3_CR24"},{"issue":"4","key":"3_CR25","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"MG Reed","year":"1998","unstructured":"Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Sel. Areas Commun. 16(4), 482\u2013494 (1998)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"1","key":"3_CR26","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s42452-019-1925-y","volume":"2","author":"S Selvaraj","year":"2020","unstructured":"Selvaraj, S., Sundaravaradhan, S.: Challenges and opportunities in IoT healthcare systems: a systematic review. SN Appl. Sci. 2(1), 139 (2020)","journal-title":"SN Appl. Sci."},{"issue":"2","key":"3_CR27","first-page":"189","volume":"10","author":"AAA Sen","year":"2018","unstructured":"Sen, A.A.A., Eassa, F.A., Jambi, K., Yamin, M.: Preserving privacy in Internet of Things: a survey. Int. J. Inf. Technol. 10(2), 189\u2013200 (2018)","journal-title":"Int. J. Inf. Technol."},{"key":"3_CR28","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.future.2018.01.059","volume":"83","author":"K Sha","year":"2018","unstructured":"Sha, K., Wei, W., Yang, T.A., Wang, Z., Shi, W.: On security challenges and open issues in Internet of Things. Future Gener. Comput. Syst. 83, 326\u2013337 (2018)","journal-title":"Future Gener. Comput. Syst."},{"doi-asserted-by":"publisher","unstructured":"Shelby, Z., Bormann, C.: 6LoWPAN. Wiley, Chichester (2009). \nhttps:\/\/doi.org\/10.1002\/9780470686218\n\n, \nhttps:\/\/doi.org\/10.1002\/9780470686218","key":"3_CR29","DOI":"10.1002\/9780470686218 10.1002\/9780470686218"},{"doi-asserted-by":"crossref","unstructured":"Snader, R., Kravets, R., Harris\u00a0III, A.F.: CryptoCoP: lightweight, energy-efficient encryption and privacy for wearable devices. In: Proceedings of the 2016 Workshop on Wearable Systems and Applications, pp. 7\u201312. ACM (2016)","key":"3_CR30","DOI":"10.1145\/2935643.2935647"},{"doi-asserted-by":"crossref","unstructured":"Staudemeyer, R.C., P\u00f6hls, H.C., W\u00f3jcik, M.: The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication. In: 2018 IEEE 19th International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks\u201d (WoWMoM), pp. 14\u201320. IEEE (2018)","key":"3_CR31","DOI":"10.1109\/WoWMoM.2018.8449779"},{"key":"3_CR32","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/978-3-319-98624-1_6","volume-title":"Designing for Privacy and Its Legal Framework","author":"A Tam\u00f2-Larrieux","year":"2018","unstructured":"Tam\u00f2-Larrieux, A.: Technical tools and designs for data protection. In: Tam\u00f2-Larrieux, A. (ed.) Designing for Privacy and Its Legal Framework, pp. 101\u2013148. Springer, Cham (2018)"},{"unstructured":"Anonymizer Team: IP Rotation for Commercial Enterprises (2020). \nhttps:\/\/www.anonymizer.com\/\n\n. Accessed Apr 2020","key":"3_CR33"},{"unstructured":"Statista Team: Internet of Things (IoT) connected devices installed base worldwide from 2015 to 2025 (in billions) (2020). \nhttps:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/\n\n. Accessed Apr 2020","key":"3_CR34"},{"key":"3_CR35","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1007\/978-3-319-54395-6_58","volume-title":"The Palgrave Handbook of Survey Research","author":"R Tourangeau","year":"2018","unstructured":"Tourangeau, R.: Confidentiality, privacy, and anonymity. In: Vannette, D., Krosnick, J. (eds.) The Palgrave Handbook of Survey Research, pp. 501\u2013507. Springer, Cham (2018)"},{"doi-asserted-by":"crossref","unstructured":"Wang, S., Du, Y., Lu, T., Wu, J., Wang, T.: A survey of anonymous communication methods in Internet of Things. In: 2019 IEEE 9th International Conference on Electronics Information and Emergency Communication (ICEIEC), pp. 627\u2013633. IEEE (2019)","key":"3_CR36","DOI":"10.1109\/ICEIEC.2019.8784538"},{"issue":"9","key":"3_CR37","doi-asserted-by":"publisher","first-page":"5193","DOI":"10.1109\/JSEN.2015.2438002","volume":"15","author":"X Wang","year":"2015","unstructured":"Wang, X., Mu, Y.: Addressing and privacy support for 6LoWPAN. IEEE Sens. J. 15(9), 5193\u20135201 (2015)","journal-title":"IEEE Sens. J."},{"key":"3_CR38","first-page":"108","volume":"34","author":"X Wang","year":"2017","unstructured":"Wang, X., Mu, Y.: Communication security and privacy support in 6LoWPAN. J. Inf. Secur. Appl. 34, 108\u2013119 (2017)","journal-title":"J. Inf. Secur. Appl."},{"doi-asserted-by":"crossref","unstructured":"Yang, Q., Lu, R., Challal, Y., Laurent, M.: Security and privacy in emerging wireless networks. Secu. Commun. Netw. 2017 (2017)","key":"3_CR39","DOI":"10.1155\/2017\/5618742"},{"issue":"5","key":"3_CR40","doi-asserted-by":"publisher","first-page":"1250","DOI":"10.1109\/JIOT.2017.2694844","volume":"4","author":"Y Yang","year":"2017","unstructured":"Yang, Y., Wu, L., Yin, G., Li, L., Zhao, H.: A survey on security and privacy issues in Internet-of-Things. IEEE Internet Things J. 4(5), 1250\u20131258 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"3_CR41","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1109\/LWC.2018.2797916","volume":"7","author":"K Zeitz","year":"2018","unstructured":"Zeitz, K., Cantrell, M., Marchany, R., Tront, J.: Changing the game: a micro moving target IPv6 defense for the Internet of Things. IEEE Wirel. Commun. Lett. 7(4), 578\u2013581 (2018)","journal-title":"IEEE Wirel. Commun. Lett."}],"container-title":["Lecture Notes in Networks and Systems","Modelling and Implementation of Complex Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58861-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,5]],"date-time":"2020-09-05T18:39:04Z","timestamp":1599331144000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-58861-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,6]]},"ISBN":["9783030588601","9783030588618"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58861-8_3","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2020,9,6]]},"assertion":[{"value":"6 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Modelling and Implementation of Complex Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Batna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Algeria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"misc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/misc2020.misc-lab.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}