{"id":"https://openalex.org/W4214696809","doi":"https://doi.org/10.1109/jiot.2022.3155355","title":"Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT","display_name":"Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT","publication_year":2022,"publication_date":"2022-02-28","ids":{"openalex":"https://openalex.org/W4214696809","doi":"https://doi.org/10.1109/jiot.2022.3155355"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2022.3155355","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3155355","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073181706","display_name":"Dajiang Chen","orcid":"https://orcid.org/0000-0003-0745-5836"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dajiang Chen","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","Network Communication Research Centre, Peng Cheng Laboratory, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"Network Communication Research Centre, Peng Cheng Laboratory, Shenzhen, China","institution_ids":["https://openalex.org/I4210136793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114406773","display_name":"Hao Wang","orcid":"https://orcid.org/0009-0003-6909-0235"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hao Wang","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100404886","display_name":"Ning Zhang","orcid":"https://orcid.org/0000-0002-8781-4925"},"institutions":[{"id":"https://openalex.org/I74413500","display_name":"University of Windsor","ror":"https://ror.org/01gw3d370","country_code":"CA","type":"education","lineage":["https://openalex.org/I74413500"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Ning Zhang","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Windsor, Windsor, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Windsor, Windsor, ON, Canada","institution_ids":["https://openalex.org/I74413500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016371039","display_name":"Xuyun Nie","orcid":"https://orcid.org/0000-0003-2868-0442"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuyun Nie","raw_affiliation_strings":["Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]},{"raw_affiliation_string":"State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072659343","display_name":"Hong\u2010Ning Dai","orcid":"https://orcid.org/0000-0001-6165-4196"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hong-Ning Dai","raw_affiliation_strings":["Department of Computing and Decision Sciences, Lingnan University, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Decision Sciences, Lingnan University, Hong Kong","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100736887","display_name":"Kuan Zhang","orcid":"https://orcid.org/0000-0002-4262-153X"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kuan Zhang","raw_affiliation_strings":["Department of ECE, University of Nebraska-Lincoln, Omaha, NE, USA"],"affiliations":[{"raw_affiliation_string":"Department of ECE, University of Nebraska-Lincoln, Omaha, NE, USA","institution_ids":["https://openalex.org/I114395901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001746807","display_name":"Kim\u2010Kwang Raymond Choo","orcid":"https://orcid.org/0000-0001-9208-5336"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kim-Kwang Raymond Choo","raw_affiliation_strings":["Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5073181706"],"corresponding_institution_ids":["https://openalex.org/I150229711","https://openalex.org/I4210136793"],"apc_list":null,"apc_paid":null,"fwci":6.619,"has_fulltext":false,"cited_by_count":50,"citation_normalized_percentile":{"value":0.9713136,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"9","issue":"18","first_page":"17265","last_page":"17279"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8111532926559448},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.8051502704620361},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6478571891784668},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5756418108940125},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.5492720603942871},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5453888177871704},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5023746490478516},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5021321773529053},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4904929995536804},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4329725503921509},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.42083272337913513},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.3682135343551636},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2668423056602478}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8111532926559448},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.8051502704620361},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6478571891784668},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5756418108940125},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.5492720603942871},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5453888177871704},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5023746490478516},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5021321773529053},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4904929995536804},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4329725503921509},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.42083272337913513},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.3682135343551636},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2668423056602478},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2022.3155355","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2022.3155355","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1517189076","display_name":null,"funder_award_id":"61502085","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1789960053","display_name":null,"funder_award_id":"SKLNST-2019-2-13","funder_id":"https://openalex.org/F4320327101","funder_display_name":"State Key Laboratory of Networking and Switching Technology"},{"id":"https://openalex.org/G2227486999","display_name":null,"funder_award_id":"61872059","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2738946305","display_name":null,"funder_award_id":"61771417","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327101","display_name":"State Key Laboratory of Networking and Switching Technology","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1503304944","https://openalex.org/W1516506771","https://openalex.org/W2019891719","https://openalex.org/W2088492763","https://openalex.org/W2145426052","https://openalex.org/W2147929033","https://openalex.org/W2490265015","https://openalex.org/W2537766808","https://openalex.org/W2603792932","https://openalex.org/W2612070316","https://openalex.org/W2734383261","https://openalex.org/W2734600866","https://openalex.org/W2764080192","https://openalex.org/W2789441909","https://openalex.org/W2808669017","https://openalex.org/W2890915954","https://openalex.org/W2919839278","https://openalex.org/W2928842143","https://openalex.org/W2940632674","https://openalex.org/W2953225812","https://openalex.org/W2963065250","https://openalex.org/W2983433342","https://openalex.org/W2992719113","https://openalex.org/W2996798774","https://openalex.org/W3012262239","https://openalex.org/W3034907167","https://openalex.org/W3036097652","https://openalex.org/W3038553351","https://openalex.org/W3047624045","https://openalex.org/W3048779965","https://openalex.org/W3086424741","https://openalex.org/W3102768552","https://openalex.org/W3116637734","https://openalex.org/W4233865259","https://openalex.org/W6697538429"],"related_works":["https://openalex.org/W2904818008","https://openalex.org/W2904314268","https://openalex.org/W57958781","https://openalex.org/W1554274402","https://openalex.org/W2361781577","https://openalex.org/W1488313539","https://openalex.org/W1971522943","https://openalex.org/W4308361275","https://openalex.org/W1499074627","https://openalex.org/W3034338022"],"abstract_inverted_index":{"To":[0],"ensure":[1],"the":[2,98],"security":[3,75,100,113],"of":[4,6,31],"Internet":[5],"Things":[7],"(IoT)":[8],"communications,":[9],"one":[10],"can":[11],"use":[12],"deep":[13],"packet":[14],"inspection":[15,78],"(DPI)":[16],"on":[17],"network":[18,29],"middleboxes":[19],"to":[20,70,87],"detect":[21],"and":[22,25,47,67,74,93,102,114,117],"mitigate":[23],"anomalies":[24],"suspicious":[26],"activities":[27],"in":[28,42],"traffic":[30,38,50],"IoT,":[32],"although":[33],"doing":[34],"so":[35],"over":[36],"encrypted":[37,49],"is":[39,53,84],"challenging.":[40],"Therefore,":[41],"this":[43],"article,":[44],"an":[45,77],"efficient":[46],"privacy-preserving":[48],"detection":[51],"scheme":[52,56,110],"proposed.":[54],"The":[55],"uses":[57],"only":[58],"lightweight":[59],"cryptographic":[60],"operations":[61],"(i.e.,":[62],"symmetric":[63],"encryption,":[64],"hash":[65],"functions,":[66],"pseudorandom":[68],"functions)":[69],"achieve":[71],"both":[72],"privacy":[73,115],"within":[76],"round.":[79],"A":[80],"dispute":[81],"resolution":[82],"mechanism":[83],"also":[85,96],"designed":[86],"address":[88],"potential":[89],"disputes":[90],"between":[91],"client(s)":[92],"server(s).":[94],"We":[95],"present":[97],"corresponding":[99],"proof":[101],"experimental":[103],"evaluation,":[104],"which":[105],"demonstrate":[106],"that":[107],"our":[108],"proposed":[109],"achieves":[111],"strong":[112],"preservation":[116],"good":[118],"performance.":[119]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":16},{"year":2022,"cited_by_count":5}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
