Routing attacks and mitigation methods for RPL-based Internet of Things
The recent bloom of Internet of Things (IoT) and its prevalence in many security-sensitive
environments made the security of these networks a crucial requirement. Routing in many of …
environments made the security of these networks a crucial requirement. Routing in many of …
Assessment of routing attacks and mitigation techniques with RPL control messages: A survey
Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard routing protocol for
the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless …
the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless …
Device fingerprinting for augmenting web authentication: classification and analysis of methods
F Alaca, PC Van Oorschot - Proceedings of the 32nd annual conference …, 2016 - dl.acm.org
Device fingerprinting is commonly used for tracking users. We explore device fingerprinting
but in the specific context of use for augmenting authentication, providing a state-of-the-art …
but in the specific context of use for augmenting authentication, providing a state-of-the-art …
How to catch when proxies lie: Verifying the physical locations of network proxies with active geolocation
Internet users worldwide rely on commercial network proxies both to conceal their true
location and identity, and to control their apparent location. Their reasons range from …
location and identity, and to control their apparent location. Their reasons range from …
Machine learning for in-region location verification in wireless networks
A Brighente, F Formaggio… - IEEE Journal on …, 2019 - ieeexplore.ieee.org
In-region location verification (IRLV) aims at verifying whether a user is inside a region of
interest (ROI). In wireless networks, IRLV can exploit the features of the channel between the …
interest (ROI). In wireless networks, IRLV can exploit the features of the channel between the …
The influence of explanation designs on user understanding differential privacy and making data-sharing decision
Differential privacy (DP) technologies are being promoted by organizations to encourage
data sharing. However, without a proper understanding of how these technologies work …
data sharing. However, without a proper understanding of how these technologies work …
Received signal strength-based location verification technique in Wireless Sensor Network using Spline curve
A Paul, S Sinha - The Journal of Supercomputing, 2023 - Springer
Location verification is crucial in many Wireless Sensor Networks (WSNs) applications. To
accurately identify a node's position, location verification is required, eliminating the …
accurately identify a node's position, location verification is required, eliminating the …
Revisiting the privacy implications of two-way internet latency data
B Trammell, M Kühlewind - … , PAM 2018, Berlin, Germany, March 26–27 …, 2018 - Springer
The Internet measurement community is increasingly sensitive to the privacy implications of
both active and passive measurement. Research into the drawbacks of network data …
both active and passive measurement. Research into the drawbacks of network data …
Accurate manipulation of delay-based internet geolocation
Delay-based Internet geolocation techniques are repeatedly positioned as well suited for
security-sensitive applications, eg, location-based access control, and credit-card …
security-sensitive applications, eg, location-based access control, and credit-card …
[Retracted] Teaching Practice of College Students' Marketing Course Based on the Background of the Internet Era
Z Chi, T Yang - International Transactions on Electrical Energy …, 2022 - Wiley Online Library
Marketing teaching is still largely based on theoretical teaching. This kind of teaching mode
is difficult to greatly improve the marketing practice teaching, students' practical ability …
is difficult to greatly improve the marketing practice teaching, students' practical ability …