Routing attacks and mitigation methods for RPL-based Internet of Things

A Raoof, A Matrawy, CH Lung - IEEE Communications Surveys …, 2018 - ieeexplore.ieee.org
The recent bloom of Internet of Things (IoT) and its prevalence in many security-sensitive
environments made the security of these networks a crucial requirement. Routing in many of …

Assessment of routing attacks and mitigation techniques with RPL control messages: A survey

AO Bang, UP Rao, P Kaliyar, M Conti - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Routing Protocol for Low-Power and Lossy Networks (RPL) is a standard routing protocol for
the Low Power and Lossy Networks (LLNs). It is a part of the IPv6 over Low-Power Wireless …

Device fingerprinting for augmenting web authentication: classification and analysis of methods

F Alaca, PC Van Oorschot - Proceedings of the 32nd annual conference …, 2016 - dl.acm.org
Device fingerprinting is commonly used for tracking users. We explore device fingerprinting
but in the specific context of use for augmenting authentication, providing a state-of-the-art …

How to catch when proxies lie: Verifying the physical locations of network proxies with active geolocation

Z Weinberg, S Cho, N Christin, V Sekar… - Proceedings of the …, 2018 - dl.acm.org
Internet users worldwide rely on commercial network proxies both to conceal their true
location and identity, and to control their apparent location. Their reasons range from …

Machine learning for in-region location verification in wireless networks

A Brighente, F Formaggio… - IEEE Journal on …, 2019 - ieeexplore.ieee.org
In-region location verification (IRLV) aims at verifying whether a user is inside a region of
interest (ROI). In wireless networks, IRLV can exploit the features of the channel between the …

The influence of explanation designs on user understanding differential privacy and making data-sharing decision

ZA Wen, J Jia, H Yan, Y Yao, Z Liu, C Dong - Information Sciences, 2023 - Elsevier
Differential privacy (DP) technologies are being promoted by organizations to encourage
data sharing. However, without a proper understanding of how these technologies work …

Received signal strength-based location verification technique in Wireless Sensor Network using Spline curve

A Paul, S Sinha - The Journal of Supercomputing, 2023 - Springer
Location verification is crucial in many Wireless Sensor Networks (WSNs) applications. To
accurately identify a node's position, location verification is required, eliminating the …

Revisiting the privacy implications of two-way internet latency data

B Trammell, M Kühlewind - … , PAM 2018, Berlin, Germany, March 26–27 …, 2018 - Springer
The Internet measurement community is increasingly sensitive to the privacy implications of
both active and passive measurement. Research into the drawbacks of network data …

Accurate manipulation of delay-based internet geolocation

AR Abdou, A Matrawy, PC Van Oorschot - … of the 2017 ACM on Asia …, 2017 - dl.acm.org
Delay-based Internet geolocation techniques are repeatedly positioned as well suited for
security-sensitive applications, eg, location-based access control, and credit-card …

[Retracted] Teaching Practice of College Students' Marketing Course Based on the Background of the Internet Era

Z Chi, T Yang - International Transactions on Electrical Energy …, 2022 - Wiley Online Library
Marketing teaching is still largely based on theoretical teaching. This kind of teaching mode
is difficult to greatly improve the marketing practice teaching, students' practical ability …