{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:28:28Z","timestamp":1773844108337,"version":"3.50.1"},"publisher-location":"Cham","reference-count":44,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319990729","type":"print"},{"value":"9783319990736","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99073-6_28","type":"book-chapter","created":{"date-parts":[[2018,8,10]],"date-time":"2018-08-10T18:09:38Z","timestamp":1533924578000},"page":"575-594","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways"],"prefix":"10.1007","author":[{"given":"Lei","family":"Yang","sequence":"first","affiliation":[]},{"given":"Chris","family":"Seasholtz","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Fengjun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,8]]},"reference":[{"key":"28_CR1","unstructured":"9 baby monitors wide open to hacks that expose users\u2019 most private moments. https:\/\/arstechnica.com\/security\/2015\/09\/9-baby-monitors-wide-open-to-hacks-that-expose-users-most-private-moments\/"},{"key":"28_CR2","unstructured":"Hack Samsung Fridge. https:\/\/www.pentestpartners.com\/security-blog\/hacking-defcon-23s-iot-village-samsung-fridge\/"},{"key":"28_CR3","unstructured":"Hackers Make the First-Ever Ransomware for Smart Thermostats. https:\/\/motherboard.vice.com\/en_us\/article\/aekj9j\/internet-of-things-ransomware-smart-thermostat"},{"key":"28_CR4","unstructured":"Hacking 14 IoT Devices. https:\/\/www.iotvillage.org\/slides_DC23\/IoT11-slides.pdf"},{"key":"28_CR5","unstructured":"Home Assistant. https:\/\/home-assistant.io\/"},{"key":"28_CR6","unstructured":"Intel IoT Gateway. https:\/\/www.intel.com\/content\/www\/us\/en\/internet-of-things\/gateway-solutions.html"},{"key":"28_CR7","unstructured":"Let\u2019s Encrypt. https:\/\/letsencrypt.org\/"},{"key":"28_CR8","unstructured":"Openhab. https:\/\/www.openhab.org\/"},{"key":"28_CR9","unstructured":"Ransomware Ruins Holiday By Hijacking Family\u2019s LG Smart TV on Christmas Day. https:\/\/www.yahoo.com\/tech\/ransomware-ruins-holiday-hijacking-familys-201136667.html"},{"key":"28_CR10","unstructured":"Raspberry Pi. https:\/\/www.raspberrypi.org\/"},{"key":"28_CR11","unstructured":"Smartthings. http:\/\/www.samsung.com\/us\/smart-home\/smartthings\/hubs\/f-hub-us-2-f-hub-us-2\/"},{"key":"28_CR12","unstructured":"VStarCam Eye4. http:\/\/www.eye4.so\/"},{"key":"28_CR13","unstructured":"Trendnet cameras - i always feel like somebody\u2019s watching me (2012). http:\/\/console-cowboys.blogspot.com\/2012\/01\/trendnet-cameras-i-always-feel-like.html"},{"key":"28_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-642-39077-7_8","volume-title":"Privacy Enhancing Technologies","author":"M AlSabah","year":"2013","unstructured":"AlSabah, M., Bauer, K., Elahi, T., Goldberg, I.: The path less travelled: overcoming Tor\u2019s bottlenecks with traffic splitting. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 143\u2013163. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39077-7_8"},{"key":"28_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-642-22263-4_8","volume-title":"Privacy Enhancing Technologies","author":"M AlSabah","year":"2011","unstructured":"AlSabah, M., et al.: DefenestraTor: throwing out windows in Tor. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 134\u2013154. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22263-4_8"},{"key":"28_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1007\/978-3-642-20757-0_35","volume-title":"NETWORKING 2011","author":"S Barr\u00e9","year":"2011","unstructured":"Barr\u00e9, S., Paasch, C., Bonaventure, O.: MultiPath TCP: from theory to practice. In: Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A., Scoglio, C. (eds.) NETWORKING 2011. LNCS, vol. 6640, pp. 444\u2013457. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20757-0_35"},{"key":"28_CR17","unstructured":"Burke, S.: Massive cyberattack turned ordinary devices into weapons (2016). http:\/\/money.cnn.com\/2016\/10\/22\/technology\/cyberattack-dyn-ddos\/index.html"},{"key":"28_CR18","unstructured":"Coldewey, D.: Smart locks yield to simple hacker tricks (2016). https:\/\/techcrunch.com\/2016\/08\/08\/smart-locks-yield-to-simple-hacker-tricks\/"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: the second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, August 2004","DOI":"10.21236\/ADA465464"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Fernandes, E., Jung, J., Prakash, A.: Security analysis of emerging smart home applications. In: Proceedings of the 37th IEEE Symposium on Security and Privacy (2016)","DOI":"10.1109\/SP.2016.44"},{"key":"28_CR21","unstructured":"Freitas, N.: Internet of onion things (2016). https:\/\/blog.torproject.org\/blog\/quick-simple-guide-tor-and-internet-things-so-far"},{"key":"28_CR22","unstructured":"Gartner Inc.: Gartner IoT forecast (2017). http:\/\/www.gartner.com\/newsroom\/id\/3598917"},{"key":"28_CR23","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.comnet.2016.01.009","volume":"101","author":"MS Hossain","year":"2016","unstructured":"Hossain, M.S., Muhammad, G.: Cloud-assisted industrial internet of things (IIoT)-enabled framework for health monitoring. Comput. Netw. 101, 192\u2013202 (2016)","journal-title":"Comput. Netw."},{"issue":"1","key":"28_CR24","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11280-017-0462-0","volume":"21","author":"Q Huang","year":"2018","unstructured":"Huang, Q., Wang, L., Yang, Y.: DECENT: secure and fine-grained data access control with policy updating for constrained IoT devices. World Wide Web 21(1), 151\u2013167 (2018)","journal-title":"World Wide Web"},{"key":"28_CR25","doi-asserted-by":"crossref","unstructured":"Jia, Y.J., et al.: ContexIoT: towards providing contextual integrity to appified IoT platforms. In: Proceedings of The Network and Distributed System Security Symposium, vol. 2017 (2017)","DOI":"10.14722\/ndss.2017.23051"},{"key":"28_CR26","doi-asserted-by":"crossref","unstructured":"Kim, J.E., Boulos, G., Yackovich, J., Barth, T., Beckel, C., Mosse, D.: Seamless integration of heterogeneous devices and access control in smart homes. In: 2012 8th International Conference on Intelligent Environments (IE), pp. 206\u2013213. IEEE (2012)","DOI":"10.1109\/IE.2012.57"},{"issue":"8","key":"28_CR27","doi-asserted-by":"publisher","first-page":"2710","DOI":"10.1016\/j.adhoc.2013.05.003","volume":"11","author":"T Kothmayr","year":"2013","unstructured":"Kothmayr, T., Schmitt, C., Hu, W., Br\u00fcnig, M., Carle, G.: DTLS based security and two-way authentication for the internet of things. Ad Hoc Netw. 11(8), 2710\u20132723 (2013)","journal-title":"Ad Hoc Netw."},{"key":"28_CR28","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.adhoc.2013.02.004","volume":"18","author":"YP Liao","year":"2014","unstructured":"Liao, Y.P., Hsiao, C.M.: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Netw. 18, 133\u2013146 (2014)","journal-title":"Ad Hoc Netw."},{"issue":"6","key":"28_CR29","doi-asserted-by":"publisher","first-page":"1899","DOI":"10.1109\/JIOT.2017.2707465","volume":"4","author":"Z Ling","year":"2017","unstructured":"Ling, Z., Luo, J., Xu, Y., Gao, C., Wu, K., Fu, X.: Security vulnerabilities of internet of things: a case study of the smart plug system. IEEE Internet Things J. 4(6), 1899\u20131909 (2017)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"28_CR30","doi-asserted-by":"publisher","first-page":"657","DOI":"10.1109\/TPDS.2014.2311791","volume":"26","author":"H Ning","year":"2015","unstructured":"Ning, H., Liu, H., Yang, L.T.: Aggregated-proof based hierarchical authentication scheme for the internet of things. IEEE Trans. Parallel Distrib. Syst. 26(3), 657\u2013667 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"28_CR31","doi-asserted-by":"crossref","unstructured":"Notra, S., Siddiqi, M., Gharakheili, H.H., Sivaraman, V., Boreli, R.: An experimental study of security and privacy risks with emerging household appliances. In: 2014 IEEE Conference on Communications and Network Security (CNS), pp. 79\u201384. IEEE (2014)","DOI":"10.1109\/CNS.2014.6997469"},{"issue":"10","key":"28_CR32","doi-asserted-by":"publisher","first-page":"3711","DOI":"10.1109\/JSEN.2013.2277656","volume":"13","author":"S Raza","year":"2013","unstructured":"Raza, S., Shafagh, H., Hewage, K., Hummen, R., Voigt, T.: Lithe: lightweight secure CoAP for the internet of things. IEEE Sens. J. 13(10), 3711\u20133720 (2013)","journal-title":"IEEE Sens. J."},{"key":"28_CR33","volume-title":"6LoWPAN: The Wireless Embedded Internet","author":"Z Shelby","year":"2011","unstructured":"Shelby, Z., Bormann, C.: 6LoWPAN: The Wireless Embedded Internet, vol. 43. Wiley, Hoboken (2011)"},{"key":"28_CR34","doi-asserted-by":"crossref","unstructured":"Shelby, Z., Hartke, K., Bormann, C.: The constrained application protocol (CoAP) (2014)","DOI":"10.17487\/rfc7252"},{"key":"28_CR35","doi-asserted-by":"crossref","unstructured":"Sivaraman, V., Chan, D., Earl, D., Boreli, R.: Smart-phones attacking smart-homes. In: Proceedings of the 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 195\u2013200. ACM (2016)","DOI":"10.1145\/2939918.2939925"},{"key":"28_CR36","doi-asserted-by":"crossref","unstructured":"Sivaraman, V., Gharakheili, H.H., Vishwanath, A., Boreli, R., Mehani, O.: Network-level security and privacy control for smart-home IoT devices. In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 163\u2013167. IEEE (2015)","DOI":"10.1109\/WiMOB.2015.7347956"},{"key":"28_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-642-32946-3_9","volume-title":"Financial Cryptography and Data Security","author":"T Wang","year":"2012","unstructured":"Wang, T., Bauer, K., Forero, C., Goldberg, I.: Congestion-aware path selection for Tor. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 98\u2013113. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32946-3_9"},{"key":"28_CR38","unstructured":"Winter, T.: RPL: IPv6 routing protocol for low-power and lossy networks (2012)"},{"key":"28_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1007\/978-3-319-45741-3_16","volume-title":"Computer Security \u2013 ESORICS 2016","author":"DJ Wu","year":"2016","unstructured":"Wu, D.J., Taly, A., Shankar, A., Boneh, D.: Privacy, discovery, and authentication for the internet of things. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9879, pp. 301\u2013319. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-45741-3_16"},{"key":"28_CR40","doi-asserted-by":"crossref","unstructured":"Yang, L., Humayed, A., Li, F.: A multi-cloud based privacy-preserving data publishing scheme for the internet of things. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, pp. 30\u201339. ACM (2016)","DOI":"10.1145\/2991079.2991127"},{"key":"28_CR41","doi-asserted-by":"crossref","unstructured":"Yang, L., Li, F.: Enhancing traffic analysis resistance for tor hidden services with multipath routing. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp. 745\u2013746. IEEE (2015)","DOI":"10.1109\/CNS.2015.7346915"},{"key":"28_CR42","doi-asserted-by":"crossref","unstructured":"Yang, L., Li, F.: mTor: a multipath tor routing beyond bandwidth throttling. In: 2015 IEEE Conference on Communications and Network Security (CNS), pp. 479\u2013487. IEEE (2015)","DOI":"10.1109\/CNS.2015.7346860"},{"key":"28_CR43","doi-asserted-by":"crossref","unstructured":"Yang, L., Xue, H., Li, F.: Privacy-preserving data sharing in smart grid systems. In: 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), pp. 878\u2013883. IEEE (2014)","DOI":"10.1109\/SmartGridComm.2014.7007759"},{"key":"28_CR44","doi-asserted-by":"crossref","unstructured":"Yang, L., Zheng, Q., Fan, X.: RSPP: a reliable, searchable and privacy-preserving e-healthcare system for cloud-assisted body area networks. In: INFOCOM. IEEE (2017)","DOI":"10.1109\/INFOCOM.2017.8056954"}],"container-title":["Lecture Notes in Computer Science","Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99073-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T08:59:11Z","timestamp":1751792351000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-99073-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319990729","9783319990736"],"references-count":44,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99073-6_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"8 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2018.upc.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}