{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T09:39:12Z","timestamp":1774517952184,"version":"3.50.1"},"reference-count":70,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/icnp.2019.8888033","type":"proceedings-article","created":{"date-parts":[[2019,10,31]],"date-time":"2019-10-31T19:49:43Z","timestamp":1572551383000},"page":"1-12","source":"Crossref","is-referenced-by-count":34,"title":["Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments"],"prefix":"10.1109","author":[{"given":"Jens","family":"Hiller","sequence":"first","affiliation":[]},{"given":"Jan","family":"Pennekamp","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Dahlmanns","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Henze","sequence":"additional","affiliation":[]},{"given":"Andriy","family":"Panchenko","sequence":"additional","affiliation":[]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref70","article-title":"Improving Tor using a TCP-over-DTLS tunnel","author":"reardon","year":"2009","journal-title":"Proc of the 18th Conference on USENIX Security Symposium"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2699343.2699344"},{"key":"ref38","article-title":"Measuring the Tor Network from Public Directory Information","author":"loesing","year":"2009","journal-title":"Proc Hot Topics Privacy Enhancing Technol"},{"key":"ref33","article-title":"A Survey of Anonymous Communication Channels","author":"danezis","year":"2008","journal-title":"Journal of Privacy Technology"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3232802"},{"key":"ref31","author":"freitas","year":"2016","journal-title":"The Internet of Onion Things"},{"key":"ref30","article-title":"Understanding the Mirai Botnet","author":"antonakakis","year":"2017","journal-title":"Proceedings of the 26th USENIX Security Symposium"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6384464"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3139550.3139564"},{"key":"ref35","year":"2002","journal-title":"Tor"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref60","article-title":"Droplet: Decentralized Authorization for IoT Data Streams","author":"shafagh","year":"2018","journal-title":"arXiv preprint arXiv 1806 02057 [cs CR]"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.05.003"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2015.2511301"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2016.7856708"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23149"},{"key":"ref27","year":"2019","journal-title":"tor4iot-contiki on GitHub"},{"key":"ref65","article-title":"A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic","author":"apthorpe","year":"2016","journal-title":"Workshop and Algorithmic Transparency (DAT)"},{"key":"ref66","article-title":"Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic","author":"apthorpe","year":"2017","journal-title":"arXiv preprint arXiv 1708 05044"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1145\/3338499.3357357","article-title":"Dataflow Challenges in an Internet of Production: A Security & Privacy Perspective","author":"pennekamp","year":"2019","journal-title":"Proceedings of the 5th ACM Workshop on Cyber-Physical Systems Security and PrivaCy (CPS-SPC)"},{"key":"ref67","year":"2013","journal-title":"Onion Pi"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/ISWCS.2017.8108159"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.5220\/0006591500270034"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICIOTA.2017.8073629"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4236\/ait.2013.31001"},{"key":"ref20","year":"2019","journal-title":"Tor Rendezvous Specification"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733571"},{"key":"ref21","article-title":"JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT","author":"kumar","year":"2019","journal-title":"Proceedings of the 8th Conference on USENIX Security Symposium"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/WoWMoM.2012.6263790"},{"key":"ref23","article-title":"End-to-end transport-layer security for Internet-integrated sensing applications with mutual and delegated ECC public-key authentication","author":"granjal","year":"2013","journal-title":"Proceedings of the IFIP Networking 2013 Conference"},{"key":"ref26","year":"2019","journal-title":"tor4iot-tor on GitHub"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2014.6990364"},{"key":"ref50","year":"0","journal-title":"Tor Research Safety Board"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815701"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.15"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381973"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888029"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382260"},{"key":"ref54","first-page":"143","article-title":"Effective Attacks and Provable Defenses for Website Fingerprinting","author":"wang","year":"2014","journal-title":"Proceedings of the 23rd USENIX conference on Security Symposium USENIX Association"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23477"},{"key":"ref52","year":"0","journal-title":"Tor Metrics"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2014.07.006"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSEE.2012.193"},{"key":"ref40","year":"0","journal-title":"ZigBee GATEWAYS"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"ref13","article-title":"Peer Research: What&#x2019;s Holding Back the Cloud?","year":"2012","journal-title":"Intel Technical Report"},{"key":"ref14","article-title":"Accounting for Privacy in the Cloud Computing Landscape","author":"henze","year":"2018"},{"key":"ref15","article-title":"Endto-End Transport Security in the IP-Based Internet of Things","author":"brachmann","year":"2012","journal-title":"Proceedings of the 2012 21st International Conference on Computer Communications and Networks (ICCCN) IEEE"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.21236\/ADA465464"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61996-8_37"},{"key":"ref18","article-title":"Mixmaster Protocol &#x2014; Version 2","author":"m\u00f6ller","year":"2003","journal-title":"Internet Engineering Task Force IETF Internet Draft"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2003.1199323"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2300753"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.251"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2019.8780276"},{"key":"ref5","year":"2017","journal-title":"LPWA Technology Security Comparison (White Paper)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-99073-6_28"},{"key":"ref7","article-title":"Peer-to-Peer Communication Across Network Address Translators","author":"ford","year":"2005","journal-title":"Proceedings of the 2005 USENIX Annual Technical Conference (ATC) USENIX Association"},{"key":"ref49","author":"krauss","year":"2015","journal-title":"Ethical tor research Guidelines"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3144457.3144471"},{"key":"ref46","year":"2017","journal-title":"Contiki-NG The OS for Next Generation IoT Devices"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref48","year":"2017","journal-title":"Contiki-NG tinyDTLS"},{"key":"ref47","year":"2016","journal-title":"Eclipse tinydtls"},{"key":"ref42","article-title":"Distributed Configuration, Authorization and Management in the Cloudbased Internet of Things","author":"henze","year":"2017","journal-title":"Proceedings of the 2017 IEEE International Conference on Trust Security and Privacy in Computing and Communications (TrustCom) IEEE"},{"key":"ref41","article-title":"RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks","author":"alexander","year":"2012","journal-title":"RFC 6550"},{"key":"ref44","year":"2019","journal-title":"Tor Protocol Specification"},{"key":"ref43","author":"dingledine","year":"2013","journal-title":"Improving Tor&#x2019;s Anonymity by Changing Guard Parameters"}],"event":{"name":"2019 IEEE 27th International Conference on Network Protocols (ICNP)","location":"Chicago, IL, USA","start":{"date-parts":[[2019,10,8]]},"end":{"date-parts":[[2019,10,10]]}},"container-title":["2019 IEEE 27th International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8884214\/8888028\/08888033.pdf?arnumber=8888033","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T16:21:02Z","timestamp":1658247662000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8888033\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":70,"URL":"https:\/\/doi.org\/10.1109\/icnp.2019.8888033","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}