The Complete Guide to SCION

L Chuat, M Legner, D Basin, D Hausheer, S Hitz… - Information Security and …, 2022 - Springer
The first SCION book, published in 2017, summarized the results of eight years of work by
over a dozen researchers. Now, five years later, we have completely rewritten the book. It …

One bad apple can spoil your IPv6 privacy

SJ Saidi, O Gasser, G Smaragdakis - ACM SIGCOMM Computer …, 2022 - dl.acm.org
IPv6 is being more and more adopted, in part to facilitate the millions of smart devices that
have already been installed at home. Unfortunately, we find that the privacy of a substantial …

IPvSeeYou: Exploiting leaked identifiers in IPv6 for street-level geolocation

EC Rye, R Beverly - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
We present IPvSeeYou, a privacy attack that permits a remote and unprivileged adversary to
physically geolocate many residential IPv6 hosts and networks with street-level precision …

The multiple roles that IPv6 addresses can play in today's internet

M Piraux, T Barbette, N Rybowski, L Navarre… - ACM SIGCOMM …, 2022 - dl.acm.org
The Internet use IP addresses to identify and locate network interfaces of connected devices.
IPv4 was introduced more than 40 years ago and specifies 32-bit addresses. As the Internet …

End-to-end privacy for identity & location with IP

SN Bhatti, G Haywood… - 2021 IEEE 29th …, 2021 - ieeexplore.ieee.org
We describe protocol features to provide both Identity Privacy and Location Privacy at the
network layer that are truly end-to-end, strengthening the trust model by constraining the …

Defence against side-channel attacks for encrypted network communication using multiple paths

GT Haywood, SN Bhatti - Cryptography, 2024 - mdpi.com
As more network communication is encrypted to provide data privacy for users, attackers are
focusing their attention on traffic analysis methods for side-channel attacks on user privacy …

Optimized Duplicate Address Detection for the Prevention of Denial-of-Service Attacks in IPv6 Network

Pragya, B Kumar, G Kumar - IETE Journal of Research, 2024 - Taylor & Francis
In constrained IoT networks, Stateless Address Autoconfiguration (SLAAC) utilizes the
Duplicate Address Detection (DAD) protocol to ensure the uniqueness of IPv6 addresses …

Network Layer Privacy Protection Using Format-Preserving Encryption

M Mićović, U Radenković, P Vuletić - Electronics, 2023 - mdpi.com
Format-Preserving Encryption (FPE) algorithms are symmetric cryptographic algorithms that
encrypt an arbitrary-length plaintext into a ciphertext of the same size. Standardisation …

Privacy friendly e-ticketing for public transport

JH Hoepman - arXiv preprint arXiv:2101.09085, 2021 - arxiv.org
This paper studies how to implement a privacy friendly form of ticketing for public transport in
practice. The protocols described are inspired by current (privacy invasive) public transport …

Automated Detection of IPv6 Privacy Leakage in Home Networks

A Zohaib, A Houmansadr - Free and Open Communications on …, 2023 - petsymposium.org
A promising feature of IPv6 is allowing devices to change their IP addresses periodically,
thereby enhancing privacy against surveillance and censorship. However, legacy …