{"id":"https://openalex.org/W2923498722","doi":"https://doi.org/10.1155/2019/9078176","title":"MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication","display_name":"MSFA: Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication","publication_year":2019,"publication_date":"2019-03-27","ids":{"openalex":"https://openalex.org/W2923498722","doi":"https://doi.org/10.1155/2019/9078176","mag":"2923498722"},"language":"en","primary_location":{"id":"doi:10.1155/2019/9078176","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/9078176","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/9078176.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2019/9078176.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Tianbo Lu","orcid":"https://orcid.org/0000-0003-2638-0251"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tianbo Lu","raw_affiliation_strings":["Key Laboratory of Trustworthy Distributed Computing and Service, Beijing University of Posts and Telecommunication, Ministry of Education, Beijing 100876, China","School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"],"raw_orcid":"https://orcid.org/0000-0003-2638-0251","affiliations":[{"raw_affiliation_string":"Key Laboratory of Trustworthy Distributed Computing and Service, Beijing University of Posts and Telecommunication, Ministry of Education, Beijing 100876, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029513258","display_name":"Ting Meng","orcid":"https://orcid.org/0000-0002-5604-1712"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ting Meng","raw_affiliation_strings":["Key Laboratory of Trustworthy Distributed Computing and Service, Beijing University of Posts and Telecommunication, Ministry of Education, Beijing 100876, China","School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Trustworthy Distributed Computing and Service, Beijing University of Posts and Telecommunication, Ministry of Education, Beijing 100876, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100323277","display_name":"Chao Li","orcid":"https://orcid.org/0000-0003-3114-2776"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chao Li","raw_affiliation_strings":["Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China"],"raw_orcid":"https://orcid.org/0000-0003-3114-2776","affiliations":[{"raw_affiliation_string":"Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102236830","display_name":"Guozhen Dong","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guozhen Dong","raw_affiliation_strings":["Key Laboratory of Trustworthy Distributed Computing and Service, Beijing University of Posts and Telecommunication, Ministry of Education, Beijing 100876, China","School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Key Laboratory of Trustworthy Distributed Computing and Service, Beijing University of Posts and Telecommunication, Ministry of Education, Beijing 100876, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101981433","display_name":"Huiyang Li","orcid":"https://orcid.org/0000-0003-0717-0419"},"institutions":[{"id":"https://openalex.org/I189196454","display_name":"The University of Texas at Arlington","ror":"https://ror.org/019kgqr73","country_code":"US","type":"education","lineage":["https://openalex.org/I189196454"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Huiyang Li","raw_affiliation_strings":["Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, VA 76091, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, VA 76091, USA","institution_ids":["https://openalex.org/I189196454"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100599376","display_name":"Jianyu Zhang","orcid":"https://orcid.org/0000-0001-6010-8556"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiao Zhang","raw_affiliation_strings":["School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029460573","display_name":"Xiao Yan Zhang","orcid":"https://orcid.org/0000-0002-7273-2249"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyan Zhang","raw_affiliation_strings":["School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100323277"],"corresponding_institution_ids":["https://openalex.org/I139759216","https://openalex.org/I37987034"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.1445,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.55503107,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8712903261184692},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6812038421630859},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.6031160354614258},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.5982365608215332},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5406872630119324},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.539006233215332},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4891255497932434},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.47533726692199707},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4457877576351166},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3231912851333618},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.3074786365032196},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.27150702476501465}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8712903261184692},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6812038421630859},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.6031160354614258},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.5982365608215332},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5406872630119324},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.539006233215332},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4891255497932434},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47533726692199707},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4457877576351166},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3231912851333618},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.3074786365032196},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.27150702476501465},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2019/9078176","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/9078176","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/9078176.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:bde303d183c74e08bc0c60c9ecf84270","is_oa":true,"landing_page_url":"https://doaj.org/article/bde303d183c74e08bc0c60c9ecf84270","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2019 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2019/9078176","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/9078176","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/9078176.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.4300000071525574}],"awards":[{"id":"https://openalex.org/G1928821393","display_name":null,"funder_award_id":"61170273","funder_id":"https://openalex.org/F4320322725","funder_display_name":"China Scholarship Council"},{"id":"https://openalex.org/G5494811842","display_name":null,"funder_award_id":"[2013]3050","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6583012931","display_name":null,"funder_award_id":"[2013]3050","funder_id":"https://openalex.org/F4320322725","funder_display_name":"China Scholarship Council"},{"id":"https://openalex.org/G7499322095","display_name":null,"funder_award_id":"61170273","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322725","display_name":"China Scholarship Council","ror":"https://ror.org/04atp4p48"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2923498722.pdf","grobid_xml":"https://content.openalex.org/works/W2923498722.grobid-xml"},"referenced_works_count":9,"referenced_works":["https://openalex.org/W2066792529","https://openalex.org/W2412908136","https://openalex.org/W2490879758","https://openalex.org/W2604754095","https://openalex.org/W2605078163","https://openalex.org/W2621961340","https://openalex.org/W2782918258","https://openalex.org/W2783903414","https://openalex.org/W2900583644"],"related_works":["https://openalex.org/W4245926026","https://openalex.org/W2032233321","https://openalex.org/W4311097251","https://openalex.org/W3121970507","https://openalex.org/W2586548817","https://openalex.org/W2110028391","https://openalex.org/W54497855","https://openalex.org/W217960748","https://openalex.org/W3125814499","https://openalex.org/W2625093826"],"abstract_inverted_index":{"For":[0],"the":[1,27,54,82,97,114,120,138,143,150,152,155,159,161,165,170,172],"past":[2],"few":[3],"years,":[4],"Internet":[5],"of":[6,29,38,56,71,136,154,164],"Things":[7],"(IoT)":[8],"has":[9],"developed":[10],"rapidly":[11],"and":[12,20,88,123,169],"been":[13,79],"extensively":[14],"used.":[15],"However,":[16],"its":[17],"transmission":[18],"security":[19,55],"privacy":[21,64],"protection":[22],"are":[23,127],"insufficient,":[24],"which":[25,59],"limits":[26],"development":[28],"IoT":[30,39],"to":[31,52,85],"a":[32,36,69,130],"certain":[33],"extent.":[34],"As":[35],"technology":[37,44],"information":[40],"transmission,":[41],"anonymous":[42,75,105],"communication":[43,76,106],"comes":[45],"into":[46],"being":[47],"as":[48],"an":[49],"important":[50],"means":[51],"ensure":[53],"healthcare":[57],"data,":[58,158],"can":[60],"better":[61],"protect":[62],"users\u2019":[63],"in":[65,110,119],"some":[66],"ways.":[67],"Nowadays,":[68],"variety":[70],"attack":[72],"techniques":[73],"for":[74,104],"systems":[77,107],"have":[78],"proposed":[80],"by":[81],"academic":[83],"community":[84],"track":[86],"senders":[87],"receivers":[89],"or":[90],"discover":[91],"communications":[92],"between":[93,133],"two":[94,134],"users.":[95],"Thus,":[96],"MSFA":[98,115],"(Multiple":[99],"System":[100],"Fingerprint":[101],"Attack)":[102],"scheme":[103,116],"is":[108,147],"presented":[109],"this":[111],"paper":[112],"where":[113],"architecture,":[117],"implementation":[118],"Tor":[121],"environment,":[122],"experimental":[124],"data":[125],"processing":[126],"described.":[128],"Through":[129],"comparative":[131],"analysis":[132],"traces":[135],"visiting":[137],"same":[139],"website":[140],"based":[141],"on":[142],"edit":[144,162],"distance,":[145],"it":[146],"shown":[148],"that":[149],"longer":[151],"length":[153],"site":[156,166],"traffic":[157,168],"greater":[160],"distance":[163],"access":[167],"larger":[171],"range.":[173]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-22T06:01:30.510260","created_date":"2025-10-10T00:00:00"}
