{"id":"https://openalex.org/W2982542479","doi":"https://doi.org/10.1109/icnp.2019.8888033","title":"Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments","display_name":"Tailoring Onion Routing to the Internet of Things: Security and Privacy in Untrusted Environments","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W2982542479","doi":"https://doi.org/10.1109/icnp.2019.8888033","mag":"2982542479"},"language":"en","primary_location":{"id":"doi:10.1109/icnp.2019.8888033","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp.2019.8888033","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 27th International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041408697","display_name":"Jens Hiller","orcid":"https://orcid.org/0000-0001-9067-8410"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Jens Hiller","raw_affiliation_strings":["Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany"],"affiliations":[{"raw_affiliation_string":"Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany","institution_ids":["https://openalex.org/I887968799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027786698","display_name":"Jan Pennekamp","orcid":"https://orcid.org/0000-0003-0398-6904"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Jan Pennekamp","raw_affiliation_strings":["Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany"],"affiliations":[{"raw_affiliation_string":"Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany","institution_ids":["https://openalex.org/I887968799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028184712","display_name":"Markus Dahlmanns","orcid":"https://orcid.org/0000-0002-9733-540X"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Markus Dahlmanns","raw_affiliation_strings":["Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany"],"affiliations":[{"raw_affiliation_string":"Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany","institution_ids":["https://openalex.org/I887968799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063048519","display_name":"Martin Henze","orcid":"https://orcid.org/0000-0001-8717-2523"},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Martin Henze","raw_affiliation_strings":["Cyber Analysis * Defense, Fraunhofer FKIE, Bonn-Bad Godesberg, Germany"],"affiliations":[{"raw_affiliation_string":"Cyber Analysis * Defense, Fraunhofer FKIE, Bonn-Bad Godesberg, Germany","institution_ids":["https://openalex.org/I4210166245"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101804733","display_name":"Andriy Panchenko","orcid":"https://orcid.org/0009-0004-2563-4234"},"institutions":[{"id":"https://openalex.org/I51783024","display_name":"Brandenburg University of Technology Cottbus-Senftenberg","ror":"https://ror.org/02wxx3e24","country_code":"DE","type":"education","lineage":["https://openalex.org/I51783024"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Andriy Panchenko","raw_affiliation_strings":["IT Security, Brandenburg University of Technology, Cottbus, Germany"],"affiliations":[{"raw_affiliation_string":"IT Security, Brandenburg University of Technology, Cottbus, Germany","institution_ids":["https://openalex.org/I51783024"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078646305","display_name":"Klaus Wehrle","orcid":"https://orcid.org/0000-0001-8609-800X"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Klaus Wehrle","raw_affiliation_strings":["Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany"],"affiliations":[{"raw_affiliation_string":"Communication and Distributed Systems, RWTH Aachen University, Aachen, Germany","institution_ids":["https://openalex.org/I887968799"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5041408697"],"corresponding_institution_ids":["https://openalex.org/I887968799"],"apc_list":null,"apc_paid":null,"fwci":4.6307,"has_fulltext":false,"cited_by_count":43,"citation_normalized_percentile":{"value":0.95860711,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7811731100082397},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7188885807991028},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5819396376609802},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5421098470687866},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.494566410779953},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4600311517715454},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4214320778846741},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.41815829277038574},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.41220641136169434},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.35420310497283936}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7811731100082397},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7188885807991028},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5819396376609802},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5421098470687866},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.494566410779953},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4600311517715454},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4214320778846741},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.41815829277038574},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.41220641136169434},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.35420310497283936}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icnp.2019.8888033","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icnp.2019.8888033","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE 27th International Conference on Network Protocols (ICNP)","raw_type":"proceedings-article"},{"id":"pmh:oai:fraunhofer.de:N-634683","is_oa":false,"landing_page_url":"http://publica.fraunhofer.de/documents/N-634683.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400801","display_name":"Publikationsdatenbank der Fraunhofer-Gesellschaft (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer FKIE","raw_type":"Conference Paper"},{"id":"pmh:oai:publica.fraunhofer.de:publica/411070","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/411070","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":65,"referenced_works":["https://openalex.org/W1027140116","https://openalex.org/W1481202711","https://openalex.org/W1498777973","https://openalex.org/W1545174125","https://openalex.org/W1606058619","https://openalex.org/W1611777866","https://openalex.org/W1655958391","https://openalex.org/W2019682598","https://openalex.org/W2031925412","https://openalex.org/W2034931560","https://openalex.org/W2038194220","https://openalex.org/W2052009734","https://openalex.org/W2052938009","https://openalex.org/W2054397419","https://openalex.org/W2065503082","https://openalex.org/W2079549476","https://openalex.org/W2079978789","https://openalex.org/W2080977773","https://openalex.org/W2103647628","https://openalex.org/W2107710541","https://openalex.org/W2111619626","https://openalex.org/W2113154117","https://openalex.org/W2149140091","https://openalex.org/W2149280729","https://openalex.org/W2150248082","https://openalex.org/W2156186849","https://openalex.org/W2163007546","https://openalex.org/W2170085959","https://openalex.org/W2272516773","https://openalex.org/W2303186826","https://openalex.org/W2325877089","https://openalex.org/W2342570382","https://openalex.org/W2508433864","https://openalex.org/W2588010597","https://openalex.org/W2613843087","https://openalex.org/W2620213176","https://openalex.org/W2748868501","https://openalex.org/W2749429923","https://openalex.org/W2755679140","https://openalex.org/W2763006672","https://openalex.org/W2766562347","https://openalex.org/W2769529634","https://openalex.org/W2785858301","https://openalex.org/W2794648128","https://openalex.org/W2805676811","https://openalex.org/W2886665116","https://openalex.org/W2887363536","https://openalex.org/W2911674248","https://openalex.org/W2944132414","https://openalex.org/W2966267176","https://openalex.org/W2969503317","https://openalex.org/W2970774384","https://openalex.org/W2986012756","https://openalex.org/W6628849624","https://openalex.org/W6629823486","https://openalex.org/W6632515142","https://openalex.org/W6636063890","https://openalex.org/W6682188453","https://openalex.org/W6739320202","https://openalex.org/W6743493502","https://openalex.org/W6743673742","https://openalex.org/W6744033719","https://openalex.org/W6752159241","https://openalex.org/W6758462160","https://openalex.org/W6763082449"],"related_works":["https://openalex.org/W2122026593","https://openalex.org/W1966494590","https://openalex.org/W2289378658","https://openalex.org/W1531360494","https://openalex.org/W2093529019","https://openalex.org/W1982325601","https://openalex.org/W4240432851","https://openalex.org/W154233216","https://openalex.org/W2626486901","https://openalex.org/W1988007309"],"abstract_inverted_index":{"An":[0],"increasing":[1],"number":[2],"of":[3,28,93,139,183],"IoT":[4,9,29,43,47,57,107,123,141,154,165,172],"scenarios":[5],"involve":[6],"mobile,":[7],"resource-constrained":[8],"devices":[10,48,58,173],"that":[11],"rely":[12],"on":[13,42,105],"untrusted":[14,52],"networks":[15,53],"for":[16,153,163],"Internet":[17],"connectivity.":[18],"In":[19],"such":[20],"environments,":[21],"attackers":[22],"can":[23],"derive":[24],"sensitive":[25],"private":[26],"information":[27],"device":[30,142],"owners,":[31],"e.g.,":[32],"daily":[33],"routines":[34],"or":[35,136],"secret":[36,83],"supply":[37],"chain":[38],"procedures,":[39],"when":[40],"sniffing":[41],"communication":[44,68,81],"and":[45,49,84,101,128,150],"linking":[46],"owner.":[50,143],"Furthermore,":[51],"do":[54],"not":[55],"provide":[56],"with":[59],"any":[60],"protection":[61],"against":[62,87],"attacks":[63],"from":[64],"the":[65,78,91,122,140,164,167,180],"Internet.":[66],"Anonymous":[67],"using":[69],"onion":[70,94,119,161],"routing":[71,95,120,162],"provides":[72],"a":[73,134],"well-proven":[74],"mechanism":[75],"to":[76,121,133,174,178,188],"keep":[77],"relationship":[79],"between":[80],"partners":[82],"(optionally)":[85],"protect":[86],"network":[88,170],"attacks.":[89],"However,":[90],"application":[92],"is":[96],"challenged":[97],"by":[98,124],"protocol":[99,126],"incompatibilities":[100,127],"demanding":[102],"cryptographic":[103,131],"processing":[104,132],"constrained":[106],"devices,":[108],"rendering":[109],"its":[110,176],"use":[111],"infeasible.":[112],"To":[113,156],"close":[114],"this":[115],"gap,":[116],"we":[117,145,159],"tailor":[118],"bridging":[125],"offloading":[129],"expensive":[130],"router":[135],"web":[137],"server":[138],"Thus,":[144],"realize":[146],"resource-conserving":[147],"access":[148],"control":[149],"end-to-end":[151],"security":[152],"devices.":[155,190],"prove":[157],"applicability,":[158],"deploy":[160],"within":[166],"well-established":[168],"Tor":[169],"enabling":[171],"leverage":[175],"resources":[177],"achieve":[179],"same":[181],"grade":[182],"anonymity":[184],"as":[185],"readily":[186],"available":[187],"traditional":[189]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":5}],"updated_date":"2026-03-26T15:22:09.906841","created_date":"2025-10-10T00:00:00"}
