Privacy-preserving energy trading using consortium blockchain in smart grid

K Gai, Y Wu, L Zhu, M Qiu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Implementing blockchain techniques has enabled secure smart trading in many realms, eg
neighboring energy trading. However, trading information recorded on the blockchain also …

An evaluation framework for privacy‐preserving solutions applicable for blockchain‐based internet‐of‐things platforms

MD Firoozjaei, R Lu, AA Ghorbani - Security and Privacy, 2020 - Wiley Online Library
Blockchain‐based applications provide many promising opportunities to overcome the
challenges associated with the Internet of Things (IoT) ecosystems (eg, centralized …

Hy-Bridge: A hybrid blockchain for privacy-preserving and trustful energy transactions in Internet-of-Things platforms

M Daghmehchi Firoozjaei, A Ghorbani, H Kim, JS Song - Sensors, 2020 - mdpi.com
In the current centralized IoT ecosystems, all financial transactions are routed through IoT
platform providers. The security and privacy issues are inevitable with an untrusted or …

Privacy-preserving scheme with account-mapping and noise-adding for energy trading based on consortium blockchain

X Zhang, S Jiang, Y Liu, T Jiang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The maturity in information technology and new energy technologies enables participants to
generate, buy, and sell energy in energy trading systems. Although applying blockchain …

Building up knowledge through passive WiFi probes

AEC Redondi, M Cesana - Computer Communications, 2018 - Elsevier
Inexpensive WiFi-capable hardware can be nowadays easily used to capture traffic from end
users and extract knowledge. Such knowledge can be leveraged to support advanced …

[HTML][HTML] Detection of Access Point Spoofing in the Wi-Fi Fingerprinting Based Positioning

J Machaj, C Safon, S Matúška, P Brída - Sensors, 2024 - mdpi.com
Indoor positioning based on Wi-Fi signals has gained a lot of attention lately. There are
many advantages related to the use of Wi-Fi signals for positioning, including the availability …

Wi-Fi tracking: Fingerprinting attacks and counter-measures

C Matte - 2017 - theses.hal.science
The recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and
wearable devices) comes with a privacy threat to their owner, and to society as a whole …

Detection of spoofing attacks in WLAN-based positioning systems using WiFi hotspot tags

A Ye, Q Li, Q Zhang, B Cheng - IEEE Access, 2020 - ieeexplore.ieee.org
WLAN-based localization is widely adopted for mobile positioning, which is the prerequisite
for location based services and more. However, the existing positioning systems are …

A signature-based wireless intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks

M Thankappan, H Rifà-Pous, C Garrigues - IEEE Access, 2024 - ieeexplore.ieee.org
One of the advanced Man-in-the-Middle (MitM) attacks is the Multi-Channel MitM (MC-MitM)
attack, which is capable of manipulating encrypted wireless frames between clients and the …

Passive classification of Wi-Fi enabled devices

AEC Redondi, D Sanvito, M Cesana - Proceedings of the 19th ACM …, 2016 - dl.acm.org
We propose a method for classifying Wi-Fi enabled mobile handheld devices (smartphones)
and non-handheld devices (laptops) in a completely passive way, that is resorting neither to …