IPv6 is being more and more adopted, in part to facilitate the millions of smart devices that have already been installed at home. Unfortunately, we find that the privacy of a substantial …
EC Rye, R Beverly - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
We present IPvSeeYou, a privacy attack that permits a remote and unprivileged adversary to physically geolocate many residential IPv6 hosts and networks with street-level precision …
The Internet use IP addresses to identify and locate network interfaces of connected devices. IPv4 was introduced more than 40 years ago and specifies 32-bit addresses. As the Internet …
We describe protocol features to provide both Identity Privacy and Location Privacy at the network layer that are truly end-to-end, strengthening the trust model by constraining the …
As more network communication is encrypted to provide data privacy for users, attackers are focusing their attention on traffic analysis methods for side-channel attacks on user privacy …
In constrained IoT networks, Stateless Address Autoconfiguration (SLAAC) utilizes the Duplicate Address Detection (DAD) protocol to ensure the uniqueness of IPv6 addresses …
M Mićović, U Radenković, P Vuletić - Electronics, 2023 - mdpi.com
Format-Preserving Encryption (FPE) algorithms are symmetric cryptographic algorithms that encrypt an arbitrary-length plaintext into a ciphertext of the same size. Standardisation …
This paper studies how to implement a privacy friendly form of ticketing for public transport in practice. The protocols described are inspired by current (privacy invasive) public transport …
A Zohaib, A Houmansadr - Free and Open Communications on …, 2023 - petsymposium.org
A promising feature of IPv6 is allowing devices to change their IP addresses periodically, thereby enhancing privacy against surveillance and censorship. However, legacy …