{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T20:36:16Z","timestamp":1760646976255},"reference-count":99,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T00:00:00Z","timestamp":1551139200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s40860-019-00075-0","type":"journal-article","created":{"date-parts":[[2019,2,26]],"date-time":"2019-02-26T12:25:12Z","timestamp":1551183912000},"page":"41-64","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["What it takes to boost Internet of Things privacy beyond encryption with unobservable communication: a survey and lessons learned from the first implementation of DC-net"],"prefix":"10.1007","volume":"5","author":[{"given":"Ralf C.","family":"Staudemeyer","sequence":"first","affiliation":[]},{"given":"Henrich C.","family":"P\u00f6hls","sequence":"additional","affiliation":[]},{"given":"Marcin","family":"W\u00f3jcik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,26]]},"reference":[{"issue":"4","key":"75_CR1","doi-asserted-by":"publisher","first-page":"2317","DOI":"10.1109\/COMST.2015.2474118","volume":"17","author":"I Ahmad","year":"2015","unstructured":"Ahmad I, Namal S, Ylianttila M, Gurtov A (2015) Security in software defined networks: a survey. IEEE Commun Surv Tutor 17(4):2317\u20132346. \n                    https:\/\/doi.org\/10.1109\/COMST.2015.2474118","journal-title":"IEEE Commun Surv Tutor"},{"key":"75_CR2","unstructured":"Angelakis V, Cuellar J, Fischer K, Fowler S, Gessner J, Gundleg\u00e5rd D, Helgesson D, Konios G, Lioumpas A, Lunggren M, Mardiak M, Moldovan G, Mouroutis T, Nechifor S, Oikonomou G, P\u00f6hls HC, Ruiz D, Siris V, Suppan S, Stamatakis G, Stylianou Y, Traganitis A, Tragos EZ (2014) The RERUM system architecture. Tech. rep., University of Passau"},{"key":"75_CR3","unstructured":"Baldini G, Peirce T, Botterman M, Talacchini MC, Pereira A, Handte M, Rotondi D, P\u00f6hls HC, Vermesan O, Baddii A, Copigneaux B, Schreckling D, Vigano L, Steri G, Piccione S, Vlacheas P, Stavroulaki V, Kelaidonis, D., Neisse, R., Tragos E, Smadja P, Hennebert C, Serrano M, Severi S, Abreu G, Kirstein PT, Varakliotis S, Skarmeta A (2015) Internet of Things: IoT governance, privacy and security issues. In: Position paper activity chain 05, IERC-European research cluster on the Internet of Things"},{"issue":"1","key":"75_CR4","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/s11277-011-0288-5","volume":"58","author":"D Bandyopadhyay","year":"2011","unstructured":"Bandyopadhyay D, Sen J (2011) Internet of things: applications and challenges in technology and standardization. Wirel Pers Commun 58(1):49\u201369","journal-title":"Wirel Pers Commun"},{"key":"75_CR5","doi-asserted-by":"crossref","unstructured":"Bauer J, Staudemeyer RC (2017) From dining cryptographers to dining things: unobservable communication in the IoT in practice. In: Proceedings of the international workshop on computer-aided modeling analysis and design of communication links and networks (CAMAD\u201917), p\u00a09","DOI":"10.1109\/CAMAD.2017.8031529"},{"key":"75_CR6","doi-asserted-by":"crossref","unstructured":"Bauer J, Staudemeyer RC, P\u00f6hls HC, Fragkiadakis A (2016) ECDSA on things: IoT integrity protection in practice. In: Proceedings of the 18th international conference on information and communications security (ICICS\u201916). Springer, pp 1\u201315. Retrieved from \n                    https:\/\/projects.eclipse.org\/projects\/iot.tinydtls\n                    \n                  . Accessed 29 June 2016","DOI":"10.1007\/978-3-319-50011-9_1"},{"key":"75_CR7","unstructured":"Bergmann O (2015) TinyDTLS: a DTLS open source stack. Retrieved from \n                    https:\/\/projects.eclipse.org\/projects\/iot.tinydtls.\n                    \n                   Accessed 29 June 2016"},{"key":"75_CR8","doi-asserted-by":"crossref","unstructured":"Bernstein DJ (2006) Curve25519: New Diffie\u2013Hellman speed records. In: Proceedings of the int. workshop on public key cryptography (PKC\u201906), LNCS, vol 3958. Springer, pp 207\u2013228","DOI":"10.1007\/11745853_14"},{"key":"75_CR9","first-page":"109","volume":"9497","author":"DJ Bernstein","year":"2014","unstructured":"Bernstein DJ, Chou T, Chuengsatiansup C, H\u00fclsing A, Lambooij E, Lange T, Niederhagen R, van Vredendaal C (2014) How to manipulate curve standards: a white paper for the Black Hat. Secur Stand Res LNCS 9497:109\u2013139","journal-title":"Secur Stand Res LNCS"},{"issue":"2","key":"75_CR10","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s13389-012-0027-1","volume":"2","author":"DJ Bernstein","year":"2012","unstructured":"Bernstein DJ, Duif N, Lange T, Schwabe P, Yang By (2012) High-speed high-security signatures. J Cryptogr Eng 2(2):77\u201389","journal-title":"J Cryptogr Eng"},{"key":"75_CR11","unstructured":"Bernstein DJ, van Gastel B, Janssen W, Lange T, Schwabe P, Smetsers S (2014) TweetNaCl: a crypto library in 100 tweets. In: Proceedings of the international conference on cryptology and information security in Latin America (LATINCRYPT\u201914), vol 8895"},{"key":"75_CR12","doi-asserted-by":"publisher","unstructured":"Bilzhause A, P\u00f6hls HC, Samelin K (2017) Position paper: the past, present, and future of sanitizable and redactable signatures. In: Proceedings of international conference on availability, reliability and security (ARES 2017), pp 87:1\u201387:9. ACM. \n                    https:\/\/doi.org\/10.1145\/3098954.3104058\n                    \n                  . Sep 2017","DOI":"10.1145\/3098954.3104058"},{"key":"75_CR13","doi-asserted-by":"crossref","unstructured":"Brandt A, Hui J, Kelsey R, Levis P, Pister K, Struik R, Alexander R (2012) RFC6550\u2014RPL: IPv6 routing protocol for low-power and lossy networks, Winter T, Thubert P (eds). \n                    https:\/\/doi.org\/10.17487\/rfc6550","DOI":"10.17487\/rfc6550"},{"key":"75_CR14","unstructured":"Cavoukian A (2009) 7 Foundational Principles - Privacy By Design. Retrieved from \n                    https:\/\/www.privacybydesign.ca\/index.php\/about-pbd\/7-foundational-principles\n                    \n                  . Accessed 27 July 2015"},{"key":"75_CR15","doi-asserted-by":"publisher","unstructured":"Chakrabarti S, Nordmark E, Bormann C (2012) RFC6775\u2014neighbor discovery optimization for ipv6 over low-power wireless personal area networks (6LoWPANs) Shelby Z (ed). \n                    https:\/\/doi.org\/10.17487\/rfc6775","DOI":"10.17487\/rfc6775"},{"issue":"2","key":"75_CR16","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"DL Chaum","year":"1981","unstructured":"Chaum DL (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2):84\u201390","journal-title":"Commun. ACM"},{"issue":"1","key":"75_CR17","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00206326","volume":"1","author":"DL Chaum","year":"1988","unstructured":"Chaum DL (1988) The dining cryptographers problem: unconditional sender and recipient untraceability. J Cryptol 1(1):65\u201375","journal-title":"J Cryptol"},{"key":"75_CR18","unstructured":"Contiki (2017) Contiki: the open source OS for the internet of things. Retrieved from \n                    http:\/\/www.contiki-os.org\/\n                    \n                  . Accessed 27 May 2017"},{"issue":"3","key":"75_CR19","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/BF01200848","volume":"1","author":"DA Cooper","year":"1995","unstructured":"Cooper DA, Birman KP (1995) The design and implementation of a private message service for mobile computers. Wirel Netw 1(3):297\u2013309","journal-title":"Wirel Netw"},{"key":"75_CR20","doi-asserted-by":"crossref","unstructured":"Corrigan-Gibbs H, Ford B (2010) Dissent: accountable anonymous group messaging. In: Proceedings of the 17th ACM conference on computer and communications security (CCS\u201910), pp 340\u2013350. ACM","DOI":"10.1145\/1866307.1866346"},{"key":"75_CR21","unstructured":"Cuellar J, Bauer J, Fragkiadakis A, Petschkuhn B, P\u00f6hls HC, Ruiz D, Tragos EZ, Staudemeyer RC, Suppan S, Weber R, W\u00f3jcik M (2015) Privacy enhancing techniques in Smart City applications. Tech. rep., University of Passau"},{"key":"75_CR22","doi-asserted-by":"publisher","unstructured":"Cuellar J, Ochoa M, Rios R (2012) Indistinguishable regions in geographic privacy. In: Proceedings of the 27th annual ACM symposium on applied computing, SAC \u201912. ACM, New York. pp 1463\u20131469. \n                    https:\/\/doi.org\/10.1145\/2245276.2232010","DOI":"10.1145\/2245276.2232010"},{"key":"75_CR23","unstructured":"Danezis G, Clayton R (2007) Introducing traffic analysis. In: Digital privacy: theory, technologies, and practices, pp 1\u201324"},{"key":"75_CR24","doi-asserted-by":"crossref","unstructured":"Danezis G, Dingledine R, Mathewson N (2003) Mixminion: design of a type III anonymous remailer protocol. In: Proceedings of the symposium on security and privacy. IEEE, pp 2\u201315","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"75_CR25","unstructured":"Danezis G, Domingo-Ferrer J, Hansen M, Hoepman JH, Metayer DL, Tirtea R, Schiffner S (2014) Privacy and data protection by design\u2014from policy to engineering. Tech. Rep. dec, European Union Agency for Network and Information Security"},{"key":"75_CR26","doi-asserted-by":"crossref","unstructured":"Dingledine R, Mathewson N, Syverson P (2004) Tor: The second-generation onion router. In: Proceedings of the 13th USENIX security symp., vol\u00a013. USENIX Association. pp 303\u2013320","DOI":"10.21236\/ADA465464"},{"key":"75_CR27","unstructured":"Dunkels A (2007) RIME\u2014a lightweight layered communication stack for sensor networks. In: Proceedings of the European conference on wireless sensor networks (EWSN\u201907), Poster Abstract, p\u00a02"},{"key":"75_CR28","doi-asserted-by":"crossref","unstructured":"Dunkels A, Gr\u00f6nvall B, Voigt T (2004) Contiki\u2014a lightweight and flexible operating system for tiny networked sensors. In: 29th annual international conference on local computer networks (LCN\u201904), pp 455\u2013462","DOI":"10.1109\/LCN.2004.38"},{"key":"75_CR29","doi-asserted-by":"publisher","unstructured":"Elgzil A, Chow CE, Aljaedi A, Alamri N (2017) Cyber anonymity based on software-defined networking and onion routing (sor). In: 2017 IEEE conference on dependable and secure computing, pp 358\u2013365. \n                    https:\/\/doi.org\/10.1109\/DESEC.2017.8073856","DOI":"10.1109\/DESEC.2017.8073856"},{"key":"75_CR30","doi-asserted-by":"crossref","unstructured":"Enev M, Gupta S, Kohno T, Patel SN (2011) Televisions, video privacy, and powerline electromagnetic interference. In: Proceedings of ACM SIGSAC symposium on information, computer and communications security (ASIA CCS 2011), pp 537\u2013550. ACM","DOI":"10.1145\/2046707.2046770"},{"key":"75_CR31","unstructured":"EU Article 29 Data Protection Working Party (WP 223): Opinion 8\/2014 on the recent developments on the Internet of Things (2014)"},{"key":"#cr-split#-75_CR32.1","unstructured":"(2016) European Parliament and the Council of the European Union: Regulation"},{"key":"#cr-split#-75_CR32.2","unstructured":"(EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Off J 1-88. (OJ\u00a0L\u00a0119 of 4.5.2016)"},{"key":"75_CR33","unstructured":"European Union Agency for Network and Information Security (ENISA): recommended cryptographic measures-securing personal data (2013). URL \n                    https:\/\/www.enisa.europa.eu\/publications\/recommended-cryptographic-measures-securing-personal-data\/at_download\/fullReport"},{"key":"75_CR34","unstructured":"Fielding RT (2000) Architectural styles and the design of network-based software architectures. Ph.D. thesis, University of California, Irvine"},{"key":"75_CR35","unstructured":"Frizell S (2014) This startup is trying to create\u2014and control\u2014the Internet of your home. TIMES Magazine"},{"key":"75_CR36","unstructured":"Goel S, Robson M, Polte M, Sirer E (2003) Herbivore: a scalable and efficient protocol for anonymous communication. Tech. rep., Cornell University"},{"key":"75_CR37","doi-asserted-by":"crossref","unstructured":"Golle P, Juels A (2004) Dining cryptographers revisited. In: Proceedings of advances in cryptology (EUROCRYPT \u201904), vol 2729, pp 456\u2013473","DOI":"10.1007\/978-3-540-24676-3_27"},{"key":"75_CR38","doi-asserted-by":"crossref","unstructured":"Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on Computer and communications security, pp 89\u201398. ACM","DOI":"10.1145\/1180405.1180418"},{"key":"75_CR39","unstructured":"Guan Y, Fu X, Bettati R, Zhao W (2002) An optimal strategy for anonymous communication protocols. In: Proceedings of the 22nd international conference on distributed computing systems (ICDCS\u201902), pp 257\u2013266. IEEE"},{"key":"75_CR40","unstructured":"Hewlett Packard Enterprise (2015) Internet of Things research study. Tech. Rep. jul, HP"},{"key":"75_CR41","unstructured":"Hewlett Packard Enterprise (2015) Internet of Things Security Study: home security systems report. Tech. rep., HP"},{"key":"75_CR42","unstructured":"IEEE Standards Association: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs) (2006)"},{"key":"75_CR43","unstructured":"IEEE Standards Association: Part 15.4g: Low-Rate Wireless Personal Area Networks (LR-WPANs) Amendment 3: Physical Layer (PHY) Specifications for Low-Data-Rate, Wireless, Smart Metering Utility Networks IEEE Computer (2012)"},{"key":"75_CR44","doi-asserted-by":"crossref","unstructured":"Ilia P, Oikonomou G, Tryfonas T (2013) Cryptographic key exchange in IPv6-based low power, lossy networks. In: Workshop in information security theory and practice (WISTP\u201913), lecture notes in computer science, vol 7886, pp 34\u201349. Springer","DOI":"10.1007\/978-3-642-38530-8_3"},{"key":"75_CR45","unstructured":"ISO\/IEC: ISO\/IEC 29100:2011: information technology\u2014security techniques\u2014privacy framework. ISO, Geneva (2011)"},{"key":"75_CR46","unstructured":"Jawurek M (2013) Privacy in smart grids. Ph.D. thesis, Friedrich-Alexander-University Erlangen-Nuernberg"},{"key":"75_CR47","doi-asserted-by":"crossref","unstructured":"Johnson R, Molnar D, Song D, Wagner D (2002) Homomorphic signature schemes. In: Proceedings of the RSA security conference\u2014cryptographers track. Springer, pp 244\u2013262","DOI":"10.1007\/3-540-45760-7_17"},{"key":"75_CR48","doi-asserted-by":"crossref","unstructured":"Jonsson J, Kaliski B (2003) RFC3447\u2014Public-Key Cryptography Standards (PKCS) #1: RSA cryptography specifications version 2.1. Tech. Rep. 3447, Internet Engineering Task Force","DOI":"10.17487\/rfc3447"},{"key":"75_CR49","doi-asserted-by":"crossref","unstructured":"Josefsson S, Liusvaara I (2017) Edwards-Curve Digital Signature Algorithm (EdDSA). RFC 8032. 10.17487\/RFC8032","DOI":"10.17487\/RFC8032"},{"issue":"2","key":"75_CR50","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1109\/SURV.2011.042011.00080","volume":"14","author":"D Kelly","year":"2012","unstructured":"Kelly D, Raines R, Baldwin R, Grimaila M, Mullins B (2012) Exploring extant and emerging issues in anonymous networks: a taxonomy and survey of protocols and metrics. IEEE Commun Surv Tutor 14(2):579\u2013606","journal-title":"IEEE Commun Surv Tutor"},{"key":"75_CR51","doi-asserted-by":"crossref","unstructured":"Krentz KF, Rafiee H, Meinel C (2013) 6LoWPAN security: adding compromise resilience to the 802.15.4 security sublayer. In: Proceedings of the international workshop on adaptive security (ASPI\u201913), pp 1\u201310. ACM","DOI":"10.1145\/2523501.2523502"},{"issue":"1","key":"75_CR52","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MSP.2010.40","volume":"8","author":"MA Lisovich","year":"2010","unstructured":"Lisovich MA, Mulligan DK, Wicker SB (2010) Inferring personal information from demand-response systems. IEEE Secur Priv 8(1):11\u201320. \n                    https:\/\/doi.org\/10.1109\/MSP.2010.40","journal-title":"IEEE Secur Priv"},{"key":"75_CR53","unstructured":"MacKay K (2016) micro-ecc. Retrieved from \n                    http:\/\/kmackay.ca\/micro-ecc\/\n                    \n                  . Accessed 2 Oct 2016"},{"key":"75_CR54","doi-asserted-by":"crossref","unstructured":"McGrew D, Rescorla E (2010) RFC5764\u2014datagram transport layer security (DTLS) extension to establish keys for the secure real-time transport protocol (SRTP). Tech. rep., RFC Editor","DOI":"10.17487\/rfc5764"},{"key":"75_CR55","doi-asserted-by":"publisher","unstructured":"Meier R, Gugelmann D, Vanbever L (2017) itap: In-network traffic analysis prevention using software-defined networks. In: Proceedings of the symposium on SDN research, SOSR \u201917. ACM, New York, pp 102\u2013114. \n                    https:\/\/doi.org\/10.1145\/3050220.3050232","DOI":"10.1145\/3050220.3050232"},{"issue":"7","key":"75_CR56","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2012","unstructured":"Miorandi D, Sicari S, De Pellegrini F, Chlamtac I (2012) Internet of things: vision, applications and research challenges. Ad Hoc Netw 10(7):1497\u20131516","journal-title":"Ad Hoc Netw"},{"key":"75_CR57","unstructured":"Modadugu N, Rescorla E (2004) The design and implementation of datagram TLS. In: Proceedings of the 11th annual network and distributed system security symposium (ISOC NDSS\u201904)"},{"key":"75_CR58","unstructured":"Moeller N, Josefsson S (2015) IETF draft: EdDSA and Ed25519. Retrieved from \n                    https:\/\/tools.ietf.org\/html\/draft-josefsson-eddsa-ed25519-02\n                    \n                  . Accessed 2 Oct 2016"},{"key":"75_CR59","doi-asserted-by":"publisher","unstructured":"Molina-Markham A, Shenoy P, Fu K, Cecchet E, Irwin, D (2010) Private memoirs of a smart meter. In: Proceedings of 2nd ACM BuildSys \u201910. ACM, pp 61\u201366. \n                    https:\/\/doi.org\/10.1145\/1878431.1878446","DOI":"10.1145\/1878431.1878446"},{"key":"75_CR60","unstructured":"M\u00f6ller U, Cottrell L, Palfrader P, Sassaman L (2003) Mixmaster protocol\u2014version 2 Internet Draft, July. Retrieved from \n                    https:\/\/www.ietf.org\/archive\/id\/draft-sassaman-mixmaster-03.txt"},{"key":"75_CR61","doi-asserted-by":"publisher","unstructured":"Montenegro G, Kushalnagar N, Hui J, Culler, D (2007) RFC4944\u2014transmission of IPv6 packets over IEEE 802.15.4 networks. \n                    https:\/\/doi.org\/10.17487\/rfc4944","DOI":"10.17487\/rfc4944"},{"key":"75_CR62","doi-asserted-by":"crossref","unstructured":"M\u00f6ssinger M, Petschkuhn B, Bauer J, Staudemeyer RC, W\u00f3jcik M, P\u00f6hls HC (2016) Towards quantifying the cost of a secure IoT: overhead and energy consumption of ECC signatures on an ARM-based device. In: 17th international symposium on a world of wireless, mobile and multimedia networks (WoWMoM). IEEE, p\u00a06","DOI":"10.1109\/WoWMoM.2016.7523559"},{"key":"75_CR63","doi-asserted-by":"publisher","unstructured":"Palavras E, Fysarakis K, Papaefstathiou I, Askoxylakis I (2018) Semibiot: secure multi-protocol integration bridge for the iot. In: 2018 IEEE international conference on communications (ICC), pp 1\u20137. \n                    https:\/\/doi.org\/10.1109\/ICC.2018.8422486","DOI":"10.1109\/ICC.2018.8422486"},{"key":"75_CR64","unstructured":"Papadopoulos G, Staudemeyer RC, W\u00f3jcik M, P\u00f6hls HC, Oikonomou G, Angelakis V, Bauer J, Charalampidis P, Fragkiadakis A, Gundleg\u00e5rd D, Katuri S, Makrogiannakis A, Petschkuhn B, Stamatakis G, Surligas M, Tragos EZ, Fragkiadakis A, Tragos EZ, Papadopoulos G, Gundleg\u00e5rd D, Angelakis V, Katuri S, Bauer J, Petschkuhn B, Charalampidis P, Stamatakis G, Surligas M, Makrogiannakis A (2016) The RERUM laboratory evaluation results. Tech. rep., University of Passau"},{"key":"75_CR65","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-319-67910-5_6","volume-title":"Ad-hoc, mobile, and wireless networks","author":"P Perazzo","year":"2017","unstructured":"Perazzo P, Vallati C, Arena A, Anastasi G, Dini G (2017) An implementation and evaluation of the security features of RPL. In: Puliafito A, Bruneo D, Distefano S, Longo F (eds) Ad-hoc, mobile, and wireless networks. Springer International Publishing, Cham, pp 63\u201376"},{"key":"75_CR66","unstructured":"Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. Tech. rep., Technical University Dresden"},{"key":"75_CR67","doi-asserted-by":"crossref","unstructured":"Pfitzmann A, Pfitzmann B, Waidner M (1991) ISDN-mixes: untraceable communication with very small bandwidth overhead. In: GI\/ITG-conference \u201cKommunikation in verteilten Systemen\u201d (communication in distributed systems), pp 451\u2013463","DOI":"10.1007\/978-3-642-76462-2_32"},{"key":"75_CR68","unstructured":"Pi\u00f1ol Pi\u00f1ol O (2014) Implementation and evaluation of BSD elliptic curve cryptography. Master thesis (pre-bologna period), Universitat Polit\u00e8cnica de Catalunya"},{"key":"75_CR69","doi-asserted-by":"crossref","unstructured":"P\u00f6hls HC (2015) JSON Sensor Signatures (JSS): end-to-end integrity protection from constrained device to IoT application. In: Proceedings of the workshop on extending seamlessly to the Internet of Things (esIoT\u201915). IEEE, pp 306\u2013312","DOI":"10.1109\/IMIS.2015.48"},{"key":"75_CR70","doi-asserted-by":"crossref","unstructured":"P\u00f6hls HC, Angelakis V, Suppan S, Fischer K, Oikonomou G, Tragos EZ, Rodrigo Diaz Rodriguez, Mouroutis T (2014) RERUM: building a reliable IoT upon privacy- and security-enabled smart objects. In: Wireless communications and networking conference workshop on IoT communications and technologies (WCNC \u201914), pp 122\u2013127. IEEE","DOI":"10.1109\/WCNCW.2014.6934872"},{"key":"75_CR71","doi-asserted-by":"publisher","unstructured":"P\u00f6hls HC, Karwe M (2014) Redactable signatures to control the maximum noise for differential privacy in the smart grid. In: Proceedings of international workshop on smart grid security (SmartGridSec 2014), LNCS, vol 8448. Springer, pp 79\u201393. \n                    https:\/\/doi.org\/10.1007\/978-3-319-10329-7_6","DOI":"10.1007\/978-3-319-10329-7_6"},{"key":"75_CR72","doi-asserted-by":"publisher","unstructured":"P\u00f6hls HC, Petschkuhn B (2017) Towards compactly encoded signed IoT messages. In: Proceedings of IEEE international workshop on computer-aided modeling analysis and design of communication links and networks (IEEE CAMAD 2017). IEEE, pp 1\u20136. \n                    https:\/\/doi.org\/10.1109\/CAMAD.2017.8031622\n                    \n                  . \n                    http:\/\/henrich.poehls.com\/papers\/2017_PoehlsPetschkuhn_IoT_signature_encoding_CAMAD.pdf\n                    \n                  . Accessed: Sep 2017","DOI":"10.1109\/CAMAD.2017.8031622"},{"key":"75_CR73","doi-asserted-by":"publisher","unstructured":"P\u00f6hls HC, Petschkuhn B, R\u00fcckert J, M\u00f6ssinger M (2014) Aggregation and perturbation in practice: case-study of privacy, accuracy and performance. In: IEEE international workshop on computer-aided modeling analysis and design of communication links and networks (IEEE CAMAD 2014). IEEE, pp 183\u2013187. \n                    https:\/\/doi.org\/10.1109\/CAMAD.2014.7033231","DOI":"10.1109\/CAMAD.2014.7033231"},{"key":"75_CR74","doi-asserted-by":"publisher","unstructured":"Raghavan B, Casado M, Koponen T, Ratnasamy S, Ghodsi A, Shenker S (2012) Software-defined internet architecture: Decoupling architecture from infrastructure. In: Proceedings of the 11th ACM workshop on hot topics in networks, HotNets-XI. ACM, New York, pp 43\u201348. \n                    https:\/\/doi.org\/10.1145\/2390231.2390239","DOI":"10.1145\/2390231.2390239"},{"key":"75_CR75","doi-asserted-by":"crossref","unstructured":"Rasori M, Perazzo P, Dini G (2018) ABE-Cities: an attribute-based encryption system for smart cities. In: 2018 IEEE international conference on smart computing (SMARTCOMP). IEEE, pp 65\u201372","DOI":"10.1109\/SMARTCOMP.2018.00075"},{"key":"75_CR76","doi-asserted-by":"crossref","unstructured":"Raymond JF (2001) Traffic analysis: protocols, attacks, design issues, and open problems. In: Federrath H (ed) Designing privacy enhancing technologies, LNCS. Springer, pp 10\u201329","DOI":"10.1007\/3-540-44702-4_2"},{"issue":"4","key":"75_CR77","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/49.668972","volume":"16","author":"MG Reed","year":"1998","unstructured":"Reed MG, Syverson PF, Goldschlag DM (1998) Anonymous connections and onion routing. J Sel Areas Commun 16(4):482\u2013494","journal-title":"J Sel Areas Commun"},{"key":"75_CR78","doi-asserted-by":"publisher","DOI":"10.1201\/9781315366937","volume-title":"Location privacy in wireless sensor networks","author":"R Rios","year":"2016","unstructured":"Rios R, Lopez J, Cuellar J (2016) Location privacy in wireless sensor networks, 1st edn. CRC Press Inc, Boca Raton","edition":"1"},{"issue":"10","key":"75_CR79","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","volume":"57","author":"R Roman","year":"2013","unstructured":"Roman R, Zhou J, Lopez J (2013) On the features and challenges of security and privacy in distributed internet of things. Comput Netw 57(10):2266\u20132279","journal-title":"Comput Netw"},{"key":"75_CR80","unstructured":"Ruiz D, W\u00f3jcik M, P\u00f6hls HC et al (2015) Enhancing the autonomous smart objects and the overall system security of IoT based smart cities. Tech. rep., University of Passau"},{"key":"75_CR81","doi-asserted-by":"crossref","unstructured":"Rupprecht D, Kohls K, Holz T, P\u00f6pper C (2019) Breaking LTE on layer two. In: IEEE symposium on security & privacy (SP). IEEE","DOI":"10.1109\/SP.2019.00006"},{"key":"75_CR82","doi-asserted-by":"crossref","unstructured":"Shelby Z, Hartke K, Bormann C (2014) RFC7252\u2014the constrained application protocol (CoAP)","DOI":"10.17487\/rfc7252"},{"key":"75_CR83","doi-asserted-by":"crossref","unstructured":"Singh M, Rajan M, Shivraj V, Balamuralidhar P (2015) Secure MQTT for Internet of Things (IoT). In: 2015 fifth international conference on communication systems and network technologies (CSNT). IEEE, pp 746\u2013751","DOI":"10.1109\/CSNT.2015.16"},{"key":"75_CR84","doi-asserted-by":"crossref","unstructured":"Soroush H, Salajegheh M, Dimitriou T (2007) Providing transparent security services to sensor networks. In: Proceedings of the international conference on communications, pp 3431\u20133436","DOI":"10.1109\/ICC.2007.568"},{"key":"75_CR85","doi-asserted-by":"crossref","unstructured":"Staudemeyer RC, P\u00f6hls HC, Watson BW (2017) Security & privacy for the Internet-of-Things communication in the SmartCity. In: Designing, developing, and facilitating smart cities: urban design to IoT solutions, chap\u00a07. Springer, pp 109\u2013137","DOI":"10.1007\/978-3-319-44924-1_7"},{"key":"75_CR86","doi-asserted-by":"crossref","unstructured":"Staudemeyer RC, P\u00f6hls HC, W\u00f3jcik M (2018) The road to privacy in IoT: beyond encryption and signatures, towards unobservable communication. In: Proceedings of The 7th workshop on IoT-SoS: Internet of Things smart objects and services (WOWMOM SOS-IOT 2018). IEEE Computer Society","DOI":"10.1109\/WoWMoM.2018.8449779"},{"key":"75_CR87","unstructured":"Staudemeyer RC, Umuhoza D, Omlin CW (2005) Attacker models, traffic analysis and privacy threats in IP networks. In: Proceedings of the 12th international conference on telecommunications (ICT\u201905)"},{"key":"75_CR88","doi-asserted-by":"publisher","unstructured":"Steinfeld R, Bull L, Zheng Y (2002) Content extraction signatures. In: Proceedings of international conference on information security and cryptology (ICISC 2001), vol 2288. Springer, pp 163\u2013205. \n                    https:\/\/doi.org\/10.1007\/3-540-45861-1_22","DOI":"10.1007\/3-540-45861-1_22"},{"key":"75_CR89","unstructured":"The European Parliament and the Council of the European Union: Directive 1995\/46\/EC of the european parliament and of the council\u2014on the protection of individuals with regard to the processing of personal data on the free movement of such data (1995)"},{"key":"75_CR90","doi-asserted-by":"crossref","unstructured":"Thubert P (2011) RFC6282\u2014compression format for IPv6 datagrams over IEEE 802.15.4-based networks","DOI":"10.17487\/rfc6282"},{"key":"75_CR91","doi-asserted-by":"crossref","unstructured":"Tragos EZ, Angelakis V, Fragkiadakis A, Gundleg\u00e5rd D, Nechifor CS, Oikonomou G, P\u00f6hls HC, Gavras A (2014) Enabling reliable and secure IoT-based smart city applications. In: Proceedings of the international conference on pervasive computing and communication workshops (PERCOM\u201914). IEEE, pp 111\u2013116","DOI":"10.1109\/PerComW.2014.6815175"},{"key":"75_CR92","unstructured":"Vella M (2014) Nest CEO Tony Fadell on the future of the smart home. TIMES Magazine"},{"key":"75_CR93","unstructured":"Waidner M (1989) Unconditional sender and recipient untraceability in spite of active attacks. In: Proceedings of advances in cryptology (EUROCRYPT\u201989). Springer, pp 302\u2013319"},{"key":"75_CR94","doi-asserted-by":"crossref","unstructured":"Waidner M, Pfitzmann B (1990) The dining cryptographers in the disco: unconditional sender and recipient untraceability with computationally secure serviceability. In: Proceedings of the workshop on the theory and application of cryptographic techniques on advances in cryptology (EUROCRYPT \u201989), vol 89, pp 690","DOI":"10.1007\/3-540-46885-4_69"},{"issue":"7","key":"75_CR95","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/159544.159617","volume":"36","author":"M Weiser","year":"1993","unstructured":"Weiser M (1993) Some computer science issues in ubiquitous computing. Commun ACM 36(7):75\u201384","journal-title":"Commun ACM"},{"key":"75_CR96","unstructured":"Wolinsky DI, Corrigan-Gibbs H, Ford B, Johnson A (2012) Dissent in numbers: making strong anonymity scale. In: Proceedings of the 10th USENIX conference on operating systems design and implementation, OSDI\u201912. USENIX Association, pp 179\u2013192"},{"key":"75_CR97","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.future.2014.10.010","volume":"49","author":"X Yao","year":"2015","unstructured":"Yao X, Chen Z, Tian Y (2015) A lightweight attribute-based encryption scheme for the Internet of Things. Future Gener Comput Syst 49:104\u2013112","journal-title":"Future Gener Comput Syst"},{"key":"75_CR98","unstructured":"Zolertia (2015) RE-Mote datasheet. Retrieved from \n                    https:\/\/github.com\/Zolertia\/Resources\/wiki\/RE-Mote"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s40860-019-00075-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-019-00075-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-019-00075-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T19:08:04Z","timestamp":1582657684000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s40860-019-00075-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,26]]},"references-count":99,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["75"],"URL":"https:\/\/doi.org\/10.1007\/s40860-019-00075-0","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"value":"2199-4668","type":"print"},{"value":"2199-4676","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,26]]},"assertion":[{"value":"2 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}