{"id":"https://openalex.org/W3036137370","doi":"https://doi.org/10.1109/giots49054.2020.9119507","title":"Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications","display_name":"Towards Privacy-Preserving Local Monitoring and Evaluation of Network Traffic from IoT Devices and Corresponding Mobile Phone Applications","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3036137370","doi":"https://doi.org/10.1109/giots49054.2020.9119507","mag":"3036137370"},"language":"en","primary_location":{"id":"doi:10.1109/giots49054.2020.9119507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/giots49054.2020.9119507","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Global Internet of Things Summit (GIoTS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029839913","display_name":"Felix Klement","orcid":"https://orcid.org/0000-0001-9650-7698"},"institutions":[{"id":"https://openalex.org/I186354981","display_name":"University of Passau","ror":"https://ror.org/05ydjnb78","country_code":"DE","type":"education","lineage":["https://openalex.org/I186354981"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Felix Klement","raw_affiliation_strings":["Chair of IT-Security, University of Passau, Germany"],"affiliations":[{"raw_affiliation_string":"Chair of IT-Security, University of Passau, Germany","institution_ids":["https://openalex.org/I186354981"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063734323","display_name":"Henrich C. P\u00f6hls","orcid":"https://orcid.org/0000-0002-7256-0387"},"institutions":[{"id":"https://openalex.org/I186354981","display_name":"University of Passau","ror":"https://ror.org/05ydjnb78","country_code":"DE","type":"education","lineage":["https://openalex.org/I186354981"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Henrich C. Pohls","raw_affiliation_strings":["PIDS \u2013 Passau Institute of Digital Security, University of Passau, Germany"],"affiliations":[{"raw_affiliation_string":"PIDS \u2013 Passau Institute of Digital Security, University of Passau, Germany","institution_ids":["https://openalex.org/I186354981"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075894008","display_name":"Korbinian Spielvogel","orcid":null},"institutions":[{"id":"https://openalex.org/I186354981","display_name":"University of Passau","ror":"https://ror.org/05ydjnb78","country_code":"DE","type":"education","lineage":["https://openalex.org/I186354981"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Korbinian Spielvogel","raw_affiliation_strings":["Chair of IT-Security, University of Passau, Germany"],"affiliations":[{"raw_affiliation_string":"Chair of IT-Security, University of Passau, Germany","institution_ids":["https://openalex.org/I186354981"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029839913"],"corresponding_institution_ids":["https://openalex.org/I186354981"],"apc_list":null,"apc_paid":null,"fwci":0.2651,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.62206209,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"1","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.795853853225708},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5900446772575378},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5437958240509033},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.5151766538619995},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.4630231261253357},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.4621700942516327},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.45450761914253235},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.4424751102924347},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2571171820163727}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.795853853225708},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5900446772575378},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5437958240509033},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.5151766538619995},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.4630231261253357},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.4621700942516327},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.45450761914253235},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.4424751102924347},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2571171820163727},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/giots49054.2020.9119507","is_oa":false,"landing_page_url":"https://doi.org/10.1109/giots49054.2020.9119507","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 Global Internet of Things Summit (GIoTS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/8","score":0.5400000214576721,"display_name":"Decent work and economic growth"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W25045116","https://openalex.org/W1493989113","https://openalex.org/W1522311146","https://openalex.org/W1591234068","https://openalex.org/W1974983646","https://openalex.org/W2065257335","https://openalex.org/W2117366493","https://openalex.org/W2275100661","https://openalex.org/W2552358474","https://openalex.org/W2565772110","https://openalex.org/W2580334929","https://openalex.org/W2586625960","https://openalex.org/W2785628122","https://openalex.org/W2786357803","https://openalex.org/W2906437258","https://openalex.org/W2912944782","https://openalex.org/W2962829858","https://openalex.org/W2964138416","https://openalex.org/W2968383486","https://openalex.org/W2974043855","https://openalex.org/W3200330413","https://openalex.org/W6601028053","https://openalex.org/W6733542001","https://openalex.org/W6767139982","https://openalex.org/W6768049079"],"related_works":["https://openalex.org/W4288075818","https://openalex.org/W189451467","https://openalex.org/W2077568170","https://openalex.org/W3200138464","https://openalex.org/W2143793665","https://openalex.org/W42776009","https://openalex.org/W2138926267","https://openalex.org/W3010548582","https://openalex.org/W3167747526","https://openalex.org/W4287595293"],"abstract_inverted_index":{"This":[0,106],"paper":[1,142],"describes":[2],"ways":[3],"for":[4,103,150,171],"users":[5],"to":[6,27,40,57,99,111,125],"gain":[7],"an":[8],"insight":[9],"into":[10],"the":[11,32,35,41,45,49,52,60,74,86,92,120,131,162,166],"actual":[12],"communication":[13,90],"flow":[14,33],"of":[15,18,31,47,148,165,191],"their":[16],"Internet":[17],"Things":[19],"(IoT)":[20],"devices.":[21],"The":[22],"paper\u2019s":[23],"main":[24],"objective":[25],"is":[26,62,88,195],"enable":[28],"a":[29,82,100,145,182],"comparison":[30],"with":[34],"devices\u2019":[36],"intended":[37],"purpose":[38],"understandable":[39],"device":[42,50],"user.":[43],"On":[44],"basis":[46],"what":[48],"sends,":[51],"user":[53,83,93],"should":[54],"be":[55],"enabled":[56],"decide":[58],"whether":[59],"traffic":[61,87,133,194],"legitimate":[63],"or":[64],"not.":[65],"With":[66],"our":[67],"framework":[68],"no":[69],"additional":[70],"data":[71,108],"will":[72,202],"leave":[73],"user\u2019s":[75,132],"premises":[76],"at":[77],"any":[78],"time.":[79],"Only":[80],"when":[81],"decides":[84],"that":[85,181],"unwanted":[89],"flows":[91],"can":[94],"voluntarily":[95],"transfer":[96],"selected":[97],"excerpts":[98],"third":[101,122],"party":[102,123],"further":[104],"analysis.":[105],"limits":[107],"leakage":[109],"compared":[110],"existing":[112],"security":[113],"incident":[114],"event":[115],"management":[116],"(SIEM)":[117],"solutions,":[118],"where":[119],"monitoring":[121,190],"seeks":[124],"constantly":[126,136],"collect":[127],"all":[128],"information":[129],"about":[130],"and":[134,154,169,174,184,198],"thus":[135,185],"gets":[137],"sensitive":[138],"information.":[139],"In":[140],"this":[141,159],"we":[143,160,179],"propose":[144],"first":[146],"set":[147],"tools":[149],"purely":[151],"local":[152,156,163],"analysis":[153],"user-friendly":[155],"visualizations.":[157],"By":[158],"educate":[161],"user/operator":[164],"IoT":[167],"deployment":[168],"allow":[170],"more":[172,175,186],"informed":[173],"transparent":[176],"decisions.":[177],"Thus,":[178],"show":[180],"privacy-preserving":[183],"data-protection":[187],"(GDPR)":[188],"compliant":[189],"IoT-related":[192],"network":[193],"possible":[196],"\u2013":[197],"showcase":[199],"how":[200],"it":[201],"look.":[203]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
