Sciancalepore et al., 2020 - Google Patents
PPRQ: Privacy-preserving MAX/MIN range queries in IoT networksSciancalepore et al., 2020
View PDF- Document ID
- 12587116689207689810
- Author
- Sciancalepore S
- Di Pietro R
- Publication year
- Publication venue
- IEEE Internet of Things Journal
External Links
Snippet
Range queries are widely used in several Internet-of-Things (IoT) applications as a general strategy to improve the efficiency of the system. However, the communication patterns generated by the IoT nodes could lead to the identification of the devices satisfying the …
- 238000004891 communication 0 abstract description 11
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
- H04L45/745—Address table lookup or address filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Wang et al. | Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks | |
| Singh et al. | Mutual authentication scheme of IoT devices in fog computing environment | |
| Huang et al. | Secure encrypted-data aggregation for wireless sensor networks | |
| Sciancalepore et al. | PPRQ: Privacy-preserving MAX/MIN range queries in IoT networks | |
| Yu et al. | Privacy-preserving data aggregation computing in cyber-physical social systems | |
| Wei et al. | A decentralized authenticated key agreement scheme based on smart contract for securing vehicular ad-hoc networks | |
| Solinas | Generalized mersenne prime | |
| Nyangaresi et al. | Anonymous authentication scheme based on physically unclonable function and biometrics for smart cities | |
| Zhu et al. | Secure data aggregation in wireless sensor networks | |
| Lalouani | Sec-PUF: Securing UAV swarms communication with lightweight physical unclonable functions | |
| Saran et al. | An improvised algorithm for a dynamic key generation model | |
| Ma et al. | Edge computing assisted an efficient privacy protection layered data aggregation scheme for IIoT | |
| Trivedi et al. | Security and privacy aspects in the internet of things (IoT) and cyber-physical systems (CPS) | |
| Zhu et al. | Security and Privacy Issues in Internet of things | |
| Panwar et al. | IoT Notary: Sensor data attestation in smart environment | |
| Zhou et al. | An Efficient Chaotic Map‐Based Authentication Scheme with Mutual Anonymity | |
| Irshad et al. | DAC‐MD: A privacy preserving drone‐access control scheme for last mile delivery | |
| Ahmad et al. | A study on M2M (machine to machine) system and communication: Its security, threats, and intrusion detection system | |
| Elshweikh et al. | Literature Survey for Cybersecurity for Internet of Things (IoT) | |
| Zhang et al. | LSHSC: Lightweight and Secure Handover Scheme With Conditional Privacy-Preserving for Group-Based SDVN | |
| Kolesnikov et al. | MAC aggregation protocols resilient to DoS attacks | |
| Al-Zumia et al. | A novel fault-tolerant privacy-preserving cloud-based data aggregation scheme for lightweight health data | |
| Wang et al. | Private Data Aggregation Based on Fog‐Assisted Authentication for Mobile Crowd Sensing | |
| Taurshia et al. | Software Defined Network aided cluster key management system for secure fusion multicast communication in Internet of Vehicles. | |
| Ahmad et al. | A Study on M2M (Machine to Machine) System and Communication |