{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:05:37Z","timestamp":1773655537214,"version":"3.50.1"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2021,8,1]]},"DOI":"10.1587\/transcom.2020ebp3182","type":"journal-article","created":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T22:07:15Z","timestamp":1612822035000},"page":"961-973","source":"Crossref","is-referenced-by-count":10,"title":["Bandwidth Efficient IoT Traffic Shaping Technique for Protecting Smart Home Privacy from Data Breaches in Wireless LAN"],"prefix":"10.23919","volume":"E104.B","author":[{"given":"Kiana","family":"DZIUBINSKI","sequence":"first","affiliation":[{"name":"Faculty of Science and Technology at Sophia University"}]},{"given":"Masaki","family":"BANDAI","sequence":"additional","affiliation":[{"name":"Faculty of Science and Technology at Sophia University"}]}],"member":"263","reference":[{"key":"1","unstructured":"[1] P. Newman, \u201cTHE INTERNET OF THINGS 2020: Here&apos;s what over 400 IoT decision-makers say about the future of enterprise connectivity and how IoT companies can use it to grow revenue,\u201d https:\/\/www.businessinsider.com\/internet-of-things-report, March 2020."},{"key":"2","unstructured":"[2] N. Apthorpe, D. Reisman, S. Sundaresan, A. Narayanan, and N. Feamster, \u201cSpying on the smart home: Privacy attacks and defenses on encrypted IoT traffic,\u201d arXiv:1708.05044, Aug. 2017."},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] I. Hafeez, M. Antikainen, and S. Tarkoma, \u201cProtecting IoT-environments against traffic analysis attacks with traffic morphing,\u201d IEEE International Conference on Pervasive Computing and Communications Workshops, pp.196-201, March 2019. 10.1109\/percomw.2019.8730787","DOI":"10.1109\/PERCOMW.2019.8730787"},{"key":"4","unstructured":"[4] A. Acar, H. Fereidooni, T. Abera, A. Sikder, M. Miettinen, H. Aksu, M. Conti, A. Sadeghi, and A. Uluagac, \u201cPeek-a-Boo: I see your smart home activities, even encrypted!,\u201d arXiv:1808.02741, Aug. 2018."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] F. Zhang, W. He, and X. Liu, \u201cDefending against traffic analysis in wireless networks through traffic reshaping,\u201d International Conference on Distributed Computing, pp.593-602, June 2011. 10.1109\/icdcs.2011.77","DOI":"10.1109\/ICDCS.2011.77"},{"key":"6","unstructured":"[6] N. Lars, \u201cConnected medical devices, apps: Are they leading the IoT revolution-or vice versa,\u201d https:\/\/www.wired.com\/insights\/2014\/06\/connected-medical-devices-apps-leading-iot-revolution-vice-versa\/, 2014."},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] W. Zhou and S. Piramuthu, \u201cSecurity\/privacy of wearable fitness tracking IoT devices,\u201d 9th Iberian Conference on Information Systems and Technologies (CISTI), pp.1-5, June 2014. 10.1109\/cisti.2014.6877073","DOI":"10.1109\/CISTI.2014.6877073"},{"key":"8","unstructured":"[8] D. Kravets, \u201cSex toys and the internet of things collide-what could go wrong?,\u201d https:\/\/arstechnica.com\/tech-policy\/2016\/09\/sex-toys-and-the-internet-of-things-collide-what-could-go-wrong\/, 2016."},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] V. Srinivasan, J. Stankovic, and K. Whitehouse, \u201cProtecting your daily in-home activity information from a wireless snooping attack,\u201d ACM International Conference on Ubiquitous Computing, pp.202-211, Sept. 2008. 10.1145\/1409635.1409663","DOI":"10.1145\/1409635.1409663"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] N. Apthorpe, D. Huang, D. Reisman, A. Narayanan, and N. Feamster, \u201cKeeping the smart home private with smart(er) IoT traffic shaping,\u201d arXiv:1812.00955, March 2019.","DOI":"10.2478\/popets-2019-0040"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] M. Miettinen, A. Sadeghi, S. Marchal, N. Asokan, I. Hafeez, and S. Tarkoma, \u201cIoT SENTINEL: Automated device type Identification for Security Enforcement in IoT,\u201d IEEE International Conference on Distributed Computing Systems (ICDCS), pp.2177-2184, June 2017. 10.1109\/ICDCS.2017.283","DOI":"10.1109\/ICDCS.2017.283"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] Y. Zhu, Z. Xiao, Y. Chen, Z. Li, M. Liu, B.Y. Zhao, and H. Zheng, \u201cEt Tu Alexa? When commodity WiFi devices turn into adversarial motion sensors,\u201d arXiv:1810.10109, Jan. 2020.","DOI":"10.14722\/ndss.2020.23053"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] I. Hafeez, A.Y. Ding, M. Antikainen, and S. Tarkoma, \u201cReal-time IoT device activity detection in edge networks,\u201d arXiv:1712.05958, Oct. 2018.","DOI":"10.1007\/978-3-030-02744-5_17"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] F. Mollers, S. Seitz, A. Hellmann, and C. Sorge, \u201cShort paper: Extrapolation and prediction of user behaviour from wireless home automation communication,\u201d ACM Conference on Security and Privacy in Wireless &amp; Mobile Networks, pp.195-200, 2014. 10.1145\/2627393.2627407","DOI":"10.1145\/2627393.2627407"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] B. Copos, K. Levitt, M. Bishop, and J. Rowe, \u201cIs anybody home? Inferring activity from smart home network traffic,\u201d IEEE Security and Privacy Workshops, pp.245-251, May 2016. 10.1109\/spw.2016.48","DOI":"10.1109\/SPW.2016.48"},{"key":"16","doi-asserted-by":"publisher","unstructured":"[16] M. Conti, L.V. Mancini, R. Spolaor, and N.V. Verde, \u201cAnalyzing android encrypted network traffic to identify user actions,\u201d IEEE Trans. Inf. Forensics Security, vol.11, no.1, pp.114-125, Jan. 2016. 10.1109\/tifs.2015.2478741","DOI":"10.1109\/TIFS.2015.2478741"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] M. Schiefer, \u201cSmart home definition and security threats,\u201d International Conference on IT Security Incident Management &amp; IT Forensics, pp.114-118, May 2015. 10.1109\/imf.2015.17","DOI":"10.1109\/IMF.2015.17"},{"key":"18","doi-asserted-by":"publisher","unstructured":"[18] I. Stellios, P. Kotzanikolaou, M. Psarakis, C. Alcaraz, and J. Lopez, \u201cA survey of IoT-enabled cyberattacks: Assessing attack paths to critical infrastructures and services,\u201d IEEE Commun. Surveys Tuts., vol.20, no.4, pp.3453-3495, Fourthquarter 2018. 10.1109\/comst.2018.2855563","DOI":"10.1109\/COMST.2018.2855563"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] K. Xu, F. Wang, and X. Jia, \u201cSecure the Internet, one home at a time,\u201d Security Comm. Networks, vol.9, no.16, pp.3821-3832, July 2016. 10.1002\/sec.1569","DOI":"10.1002\/sec.1569"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] M. Frustaci, P. Pace, G. Aloi, and G. Fortino, \u201cEvaluating critical security issues of the IoT world: Present and future challenges,\u201d IEEE Internet Things J., vol.5, no.4, pp.2483-2495, Aug. 2018. 10.1109\/jiot.2017.2767291","DOI":"10.1109\/JIOT.2017.2767291"},{"key":"21","unstructured":"[21] N. Apthorpe, D. Reisman, N. Feamster, and H. Fereidooni, \u201cClosing the blinds: Four strategies for protecting smart home privacy from network observers,\u201d arXiv:1705.06809, May 2017."},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] K. Dziubinski and M. Bandai, \u201cYour neighbor knows what you&apos;re doing: Defending smart home IoT device traffic from privacy LAN attacks,\u201d Workshops of the 34th International Conference on Advanced Information Networking and Applications (WAINA), pp.526-534, April 2020. 10.1007\/978-3-030-44038-1_48","DOI":"10.1007\/978-3-030-44038-1_48"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] P. Velan, M. Cermak, P. Celeda, and M. Drasar, \u201cA survey of methods for encrypted traffic classification and analysis,\u201d International Journal of Network Management, vol.25, no.5, pp.355-374, Sept. 2015. 10.1002\/nem.1901","DOI":"10.1002\/nem.1901"},{"key":"24","doi-asserted-by":"publisher","unstructured":"[24] S.E. Coull and K.P. Dyer, \u201cTraffic analysis of encrypted messaging services: Apple iMessage and beyond,\u201d SIGCOMM Comput. Commun. Rev., vol.44, no.5, pp.5-11, Oct. 2014. 10.1145\/2677046.2677048","DOI":"10.1145\/2677046.2677048"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] Y. Meidan, M. Bohadana, A. Shabtai, J.D. Guarnizo, M. Ochoa, N.O. Tippenhauer, and Y. Elovici, \u201cProfilIoT: A machine learning approach for IoT device identification based on network traffic analysis,\u201d Symposium on Applied Computing, pp.506-509, 2017. 10.1145\/3019612.3019878","DOI":"10.1145\/3019612.3019878"},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] B. Bezawada, M. Bachani, J. Peterson, H. Shirazi, I. Ray, and I. Ray, \u201cIoTSense: Behavioral fingerprinting of IoT devices,\u201d arXiv:1804.03852, April 2018.","DOI":"10.1145\/3266444.3266452"},{"key":"27","unstructured":"[27] \u201ctsfresh,\u201d https:\/\/github.com\/blue-yonder\/tsfresh, 2018."},{"key":"28","unstructured":"[28] C.V. Wright, S.E. Coull, and F. Monrose, \u201cTraffic morphing: An efficient defense against statistical traffic analysis,\u201d 16th Network and Distributed Security Symposium, pp.237-250, Feb. 2009."},{"key":"29","doi-asserted-by":"publisher","unstructured":"[29] Y. Zhao, B. Zhang, C. Li, and C. Chen, \u201cON\/OFF traffic shaping in the Internet: Motivation, challenges, and solutions,\u201d IEEE Netw., vol.31, no.2, pp.48-57, March 2017. 10.1109\/mnet.2017.1500057nm","DOI":"10.1109\/MNET.2017.1500057NM"},{"key":"30","doi-asserted-by":"crossref","unstructured":"[30] W.M. Shbair, A.R. Bashandy, and S.I. Shaheen, \u201cA new security mechanism to perform traffic anonymity with dummy traffic synthesis,\u201d International Conference on Computational Science and Engineering, pp.405-411, Aug. 2009. 10.1109\/cse.2009.53","DOI":"10.1109\/CSE.2009.53"},{"key":"31","doi-asserted-by":"crossref","unstructured":"[31] H. Park, C. Basaran, T. Park, and S.H. Son, \u201cEnergy-efficient privacy protection for smart home environments using behavioral semantics,\u201d Sensors (Basel), vol.14, no.9, pp.16235-16257, Sept. 2014. 10.3390\/s140916235","DOI":"10.3390\/s140916235"},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] X. Gu, W. Wu, X. Gu, Z. Ling, M. Yang, and A. Song, \u201cProbe request based device identification attack and defense,\u201d Sensors (Basel), vol.20, no.16, 4620, Aug. 2020. 10.3390\/s20164620","DOI":"10.3390\/s20164620"},{"key":"33","doi-asserted-by":"crossref","unstructured":"[33] S. Lakshmanan, C. Tsao, R. Sivakumar, and K. Sundaresan, \u201cSecuring wireless data networks against eavesdropping using smart antennas,\u201d 28th International Conference on Distributed Computing Systems, pp.19-27, June 2008. 10.1109\/icdcs.2008.87","DOI":"10.1109\/ICDCS.2008.87"},{"key":"34","doi-asserted-by":"crossref","unstructured":"[34] A. Sheth, S. Seshan, and D. Wetherall, \u201cGeo-fencing: Confining Wi-Fi coverage to physical boundaries,\u201d 7th International Conference Pervasive Computing, pp.274-290, May 2009. 10.1007\/978-3-642-01516-8_19","DOI":"10.1007\/978-3-642-01516-8_19"},{"key":"35","doi-asserted-by":"crossref","unstructured":"[35] I. Martinovic, P. Pichota, and J.B. Schmitt, \u201cJamming for good: A fresh approach to authentic communication in WSNs,\u201d second ACM conference on Wireless network security, pp.161-168, March 2009. 10.1145\/1514274.1514298","DOI":"10.1145\/1514274.1514298"},{"key":"36","doi-asserted-by":"crossref","unstructured":"[36] K. Bauer, D. McCoy, B. Greenstein, D. Grunwald, and D. Sicker \u201cPhysical layer attacks on unlinkability in wireless LANs,\u201d Privacy Enhancing Technologies, pp.108-127, July 2009. 10.1007\/978-3-642-03168-7_7","DOI":"10.1007\/978-3-642-03168-7_7"},{"key":"37","doi-asserted-by":"crossref","unstructured":"[37] B. Greenstein, D. McCoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall, \u201cImproving wireless privacy with an identifier-free link layer protocol,\u201d 6th international conference on Mobile systems, applications, and services, pp.40-53, June 2008. 10.1145\/1378600.1378607","DOI":"10.1145\/1378600.1378607"},{"key":"38","doi-asserted-by":"crossref","unstructured":"[38] Y. Fan, B. Lin, Y. Jiang, and X. Shen, \u201cAn efficient privacy-preserving scheme for wireless link layer security,\u201d Global Telecommunications Conference, pp.1-5, 2008. 10.1109\/glocom.2008.ecp.891","DOI":"10.1109\/GLOCOM.2008.ECP.891"},{"key":"39","doi-asserted-by":"publisher","unstructured":"[39] W. Hu, D. Willkomm, M. Abusubaih, J. Gross, G. Vlantis, M. Gerla, and A. Wolisz, \u201cCOGNITIVE RADIOS FOR DYNAMIC SPECTRUM ACCESS-Dynamic frequency hopping communities for efficient IEEE 802.22 operation,\u201d IEEE Commun. Mag., vol.45, no.5, pp.80-87, May 2007. 10.1109\/mcom.2007.358853","DOI":"10.1109\/MCOM.2007.358853"},{"key":"40","doi-asserted-by":"crossref","unstructured":"[40] M. Vanhoef, C. Matte, M. Cunche, L. Cardoso, and F. Piessens, \u201cWhy MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms,\u201d ASIA Conference on Computer &amp; Communications Security, pp.413-424, May 2016. 10.1145\/2897845.2897883","DOI":"10.1145\/2897845.2897883"},{"key":"41","doi-asserted-by":"crossref","unstructured":"[41] S. Sadowski and P. Spachos, \u201cComparison of RSSI-based indoor localization for smart buildings with internet of things,\u201d IEEE 9th Annual Information Technology, Electronics and Mobile Communication Conference, pp.24-29, Nov. 2018. 10.1109\/iemcon.2018.8614863","DOI":"10.1109\/IEMCON.2018.8614863"},{"key":"42","unstructured":"[42] \u201chostapd,\u201d https:\/\/w1.fi\/hostapd\/, 2019."},{"key":"43","unstructured":"[43] \u201cSmartRF protocol packet sniffer,\u201d http:\/\/www.tij.co.jp\/tool\/jp\/PACKET-SNIFFER, 2019."},{"key":"44","unstructured":"[44] \u201cWireshark,\u201d https:\/\/www.wireshark.org, 2019."}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E104.B\/8\/E104.B_2020EBP3182\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T14:54:40Z","timestamp":1704898480000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E104.B\/8\/E104.B_2020EBP3182\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,1]]},"references-count":44,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2020ebp3182","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,8,1]]},"article-number":"2020EBP3182"}}