{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T03:46:38Z","timestamp":1769917598052,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Agence Nationale de la Recherche","doi-asserted-by":"publisher","award":["ANR-20-CYAL-0002"],"award-info":[{"award-number":["ANR-20-CYAL-0002"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"Institut National des Sciences Appliqu\u00e9es de Lyon","doi-asserted-by":"publisher","award":["SPIE ICS IoT Chair"],"award-info":[{"award-number":["SPIE ICS IoT Chair"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["SPARTA"],"award-info":[{"award-number":["SPARTA"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1145\/3643833.3656120","type":"proceedings-article","created":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T19:25:07Z","timestamp":1716233107000},"page":"14-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-Preserving Pseudonyms for LoRaWAN"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3554-2585","authenticated-orcid":false,"given":"Samuel","family":"P\u00e9lissier","sequence":"first","affiliation":[{"name":"INSA-Lyon, Inria, CITI Lab., Lyon, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0075-8965","authenticated-orcid":false,"given":"Jan","family":"Aalmoes","sequence":"additional","affiliation":[{"name":"INSA-Lyon, Inria, CITI Lab., Lyon, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1778-6794","authenticated-orcid":false,"given":"Abhishek Kumar","family":"Mishra","sequence":"additional","affiliation":[{"name":"INSA-Lyon, Inria, CITI Lab., Lyon, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0066-8612","authenticated-orcid":false,"given":"Mathieu","family":"Cunche","sequence":"additional","affiliation":[{"name":"INSA-Lyon, Inria, CITI Lab., Lyon, France"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2980-281X","authenticated-orcid":false,"given":"Vincent","family":"Roca","sequence":"additional","affiliation":[{"name":"University Grenoble Alpes, Inria, Grenoble, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7136-152X","authenticated-orcid":false,"given":"Didier","family":"Donsez","sequence":"additional","affiliation":[{"name":"University Grenoble Alpes, LIG, Grenoble, France"}]}],"member":"320","published-online":{"date-parts":[[2024,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"A Acar H Fereidooni T Abera AK Sikder M Miettinen H Aksu M Conti AR Sadeghi and S Uluagac. 2020. Peek-a-Boo: i See Your Smart Home Activities Even Encrypted!. In WiSec.","DOI":"10.1145\/3395351.3399421"},{"key":"e_1_3_2_1_2_1","first-page":"1","article-title":"Minimizing Power Consumption of LoRa textsuperscript\u00ae and LoRaWAN for Low-Power Wireless Sensor Nodes","volume":"1407","author":"E","year":"2019","unstructured":"E B\"aumker, A Miguel Garcia, and P Woias. 2019. Minimizing Power Consumption of LoRa textsuperscript\u00ae and LoRaWAN for Low-Power Wireless Sensor Nodes. Journal of Physics: Conference Series, Vol. 1407, 1 (Nov. 2019).","journal-title":"Journal of Physics: Conference Series"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/s17102364"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"G Celosia and M Cunche. 2019. Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism. In MobiQuitous'19.","DOI":"10.1145\/3360774.3360777"},{"key":"e_1_3_2_1_5_1","unstructured":"LoRa Alliance Technical Committee. 2017. LoRaWAN \u00ae Specification v1.1. https:\/\/lora-alliance.org\/resource_hub\/lorawan-specification-v1--1\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"L Duji\u0107 Rodi\u0107 T Perkovic M Skiljo and P Solic. 2022. Privacy Leakage of Lorawan Smart Parking Occupancy Sensors.","DOI":"10.2139\/ssrn.4049517"},{"key":"e_1_3_2_1_7_1","unstructured":"P Ginsparg. 2005. How many coin flips on average does it take to get n consecutive heads? https:\/\/www.cs.cornell.edu\/ ginsparg\/physics\/INFO295\/mh.pdf."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"B Greenstein D McCoy J Pang T Kohno S Seshan and D Wetherall. 2008. Improving Wireless Privacy with an Identifier-Free Link Layer Protocol. In MobiSys.","DOI":"10.1145\/1378600.1378607"},{"key":"e_1_3_2_1_9_1","unstructured":"Core Specification Working Group. 2023. Bluetooth \u00ae Core Specification 5.4."},{"key":"e_1_3_2_1_10_1","volume-title":"An Evolvable Survey on Vulnerabilities, Attacks and Their Systematic Mitigation. ACM Transactions on Sensor Networks (Nov","author":"Hessel F","year":"2022","unstructured":"F Hessel, L Almon, and M Hollick. 2022. LoRaWAN Security : An Evolvable Survey on Vulnerabilities, Attacks and Their Systematic Mitigation. ACM Transactions on Sensor Networks (Nov. 2022)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"P Leu I Puddu A Ranganathan and S v Capkun. 2018. I Send Therefore I Leak : Information Leakage in Low-Power Wide Area Networks. In WiSec'11.","DOI":"10.1145\/3212480.3212508"},{"key":"e_1_3_2_1_12_1","volume-title":"Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications","author":"Liu Q","unstructured":"Q Liu, Y Mu, J Zhao, J Feng, and B Wang. 2020. Characterizing Packet Loss in City-Scale LoRaWAN Deployment: Analysis and Implications. In IFIP. IEEE."},{"key":"e_1_3_2_1_13_1","volume-title":"A Study of MAC Address Randomization in Mobile Devices and When It Fails. arXiv:1703.02874 [cs] (March","author":"Martin J","year":"2017","unstructured":"J Martin, T Mayberry, C Donahue, L Foppe, L Brown, C Riggins, E C. Rye, and D Brown. 2017. A Study of MAC Address Randomization in Mobile Devices and When It Fails. arXiv:1703.02874 [cs] (March 2017). arxiv: 1703.02874 [cs]"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"S P\u00e9lissier M Cunche V Roca and D Donsez. 2022. Device Re-Identification in LoRaWAN through Messages Linkage. In WiSec.","DOI":"10.1145\/3507657.3528556"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"P Spadaccino D Garlisi F Cuomo G Pillon and P Pisani. 2021. Discovery Privacy Threats via Device De-Anonymization in LoRaWAN. In MedComNet'21.","DOI":"10.1109\/MedComNet52149.2021.9501247"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3390\/app11073176"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941972"},{"key":"e_1_3_2_1_19_1","volume-title":"Why MAC Address Randomization Is Not Enough : An Analysis of Wi-Fi Network Discovery Mechanisms (ASIA CCS '16)","author":"Vanhoef M","unstructured":"M Vanhoef, C Matte, M Cunche, L S. Cardoso, and F Piessens. 2016. Why MAC Address Randomization Is Not Enough : An Analysis of Wi-Fi Network Discovery Mechanisms (ASIA CCS '16). Association for Computing Machinery."},{"key":"e_1_3_2_1_20_1","volume-title":"Protecting Location Privacy in IoT Wireless Sensor Networks through Addresses Anonymity. Security and Comm. Networks","author":"Zhang Q","year":"2022","unstructured":"Q Zhang and K Zhang. 2022. Protecting Location Privacy in IoT Wireless Sensor Networks through Addresses Anonymity. Security and Comm. Networks (2022)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Y Zhang and Z Lin. 2022. When Good Becomes Evil : Tracking Bluetooth Low Energy Devices via Allowlist-based Side Channel and Its Countermeasure. In ACM CCS.","DOI":"10.1145\/3548606.3559372"}],"event":{"name":"WiSec '24: 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Seoul Republic of Korea","acronym":"WiSec '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643833.3656120","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643833.3656120","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:00:33Z","timestamp":1755907233000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643833.3656120"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":21,"alternative-id":["10.1145\/3643833.3656120","10.1145\/3643833"],"URL":"https:\/\/doi.org\/10.1145\/3643833.3656120","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]},"assertion":[{"value":"2024-05-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}