{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:22:34Z","timestamp":1767705754010,"version":"3.41.0"},"reference-count":31,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2022,4,18]],"date-time":"2022-04-18T00:00:00Z","timestamp":1650240000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Shaanxi Province Key Research and Development Program","award":["2022ZDLSF07-07"],"award-info":[{"award-number":["2022ZDLSF07-07"]}]},{"name":"The Youth Innovation Team of Shaanxi Universities","award":["2019-38"],"award-info":[{"award-number":["2019-38"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Sen. Netw."],"published-print":{"date-parts":[[2022,8,31]]},"abstract":"<jats:p>Anonymous exchange of data has a strong demand in many scenarios. With the development of IoT and wireless networks, plenty of smart devices are interconnected through wireless technologies such as 5G and Wi-Fi, making it possible to use them for information exchanging. The authors find a P2P network model for secure and anonymous communication, which is a typical Crowds system and the operating mechanism meets the characteristics of limited-resources of IoT devices. Based on this network model, the authors design a lightweight communication scheme for the remote-control system in this work, using two kinds of<jats:bold><jats:italic>Virtual-Space<\/jats:italic><\/jats:bold>s to achieve the purpose of identity announced and data exchanged. The authors implemented a prototype system of the scheme and tested it over the<jats:italic>Freenet<\/jats:italic>, proving that the scheme can effectively resist the impact of flow analysis on the anonymity of communication while ensuring communication data security. By analyzing the scheme\u2019s performance, the author believes that the scheme is practical and is suitable for scenarios that are not time-sensitive but require high anonymity.<\/jats:p>","DOI":"10.1145\/3508392","type":"journal-article","created":{"date-parts":[[2022,3,4]],"date-time":"2022-03-04T22:39:04Z","timestamp":1646433544000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["A Secure and Anonymous Communicate Scheme over the Internet of Things"],"prefix":"10.1145","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2019-7886","authenticated-orcid":false,"given":"Qindong","family":"Sun","sequence":"first","affiliation":[{"name":"The School of Cyber Security, Xi\u2019an Jiaotong University, China and Shaanxi Key Laboratory of Network Computing and Security, Xi\u2019an University of Technology, Xi\u2019an, China"}]},{"given":"Kai","family":"Lin","sequence":"additional","affiliation":[{"name":"The School of Cyber Security, Xi\u2019an Jiaotong University, Xi\u2019an, China"}]},{"given":"Chengxiang","family":"Si","sequence":"additional","affiliation":[{"name":"National Computer Network Emergency Response Technical Team\/Coordination Center of China (CNCERT\/CC), Beijing, China"}]},{"given":"Yanyue","family":"Xu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Xi\u2019an University of Technology, Xi\u2019an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5663-7420","authenticated-orcid":false,"given":"Shancang","family":"Li","sequence":"additional","affiliation":[{"name":"University of the West of England, Bristol, UK"}]},{"given":"Prosanta","family":"Gope","sequence":"additional","affiliation":[{"name":"University of Sheffield, Rono-Hills, Sheffield, UK"}]}],"member":"320","published-online":{"date-parts":[[2022,4,18]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/2714576.2714627"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.8"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.09.008"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/52.43044"},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","unstructured":"Mauro Conti Ali Dehghantanha Katrin Franke and Steve Watson. 2018. Internet of Things security and forensics: Challenges and opportunities.","DOI":"10.1016\/j.future.2017.07.060"},{"key":"e_1_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2004.1409169"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_1_9_2","unstructured":"Roger Dingledine and Nick Mathewson. 2006. Design of a blocking-resistant anonymity system."},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2400131"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/313451.313556"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2394370"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2399300"},{"key":"e_1_3_1_15_2","unstructured":"Eric Filiol J. Nicolas and Maxence Delong. 2018. Statistical and combinatorial analysis of the TOR routing protocol. (2018)."},{"key":"e_1_3_1_16_2","doi-asserted-by":"crossref","first-page":"11","DOI":"10.25080\/TCWV9851","volume-title":"Proceedings of the 7th Python in Science Conference","author":"Hagberg Aric A.","year":"2008","unstructured":"Aric A. Hagberg, Daniel A. Schult, and Pieter J. Swart. 2008. Exploring network structure, dynamics, and function using NetworkX. In Proceedings of the 7th Python in Science Conference, Ga\u00ebl Varoquaux, Travis Vaught, and Jarrod Millman (Eds.). Pasadena, CA USA, 11\u201315."},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2604405"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i2.7.12227"},{"key":"e_1_3_1_19_2","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/978-3-319-92384-0_6","volume-title":"Mission-Oriented Sensor Networks and Systems: Art and Science","author":"Karabiyik Umit","year":"2019","unstructured":"Umit Karabiyik and Kemal Akkaya. 2019. Digital forensics for IoT and WSNS. In Mission-Oriented Sensor Networks and Systems: Art and Science. Springer, 171\u2013207."},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.5555\/867062"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2016.10.3.12"},{"key":"e_1_3_1_22_2","article-title":"Internet of Things: Survey on security and privacy","author":"Mendez Diego M.","year":"2017","unstructured":"Diego M. Mendez, Ioannis Papapanagiotou, and Baijian Yang. 2017. Internet of Things: Survey on security and privacy. arXiv preprint arXiv:1707.01879 (2017).","journal-title":"arXiv preprint arXiv:1707.01879"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.12"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861392"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/290163.290168"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2019.03.002"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCGrid.2004.1336575"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2013.6831161"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2453983"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019373"}],"container-title":["ACM Transactions on Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508392","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:36Z","timestamp":1750182576000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508392"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,18]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,8,31]]}},"alternative-id":["10.1145\/3508392"],"URL":"https:\/\/doi.org\/10.1145\/3508392","relation":{},"ISSN":["1550-4859","1550-4867"],"issn-type":[{"type":"print","value":"1550-4859"},{"type":"electronic","value":"1550-4867"}],"subject":[],"published":{"date-parts":[[2022,4,18]]},"assertion":[{"value":"2021-09-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-12-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}