Secure forwarding of tenant workloads in virtual networks

SC Abraham, KN Kasim, P Miriyala - US Patent 11,233,778, 2022 - Google Patents
In general, techniques are described for enhancing opera tions of virtual networks. In some
examples, a network system includes a plurality of servers interconnected by a switch fabric …

Network traffic shaping for enhancing privacy in iot systems

S Xiong, AD Sarwate… - IEEE/ACM Transactions …, 2022 - ieeexplore.ieee.org
Motivated by traffic analysis attacks based on the packet sizes and timing information in the
Internet of Things (IoT) networks, we establish a rigorous event-level differential privacy (DP) …

Optimal privacy-preserving probabilistic routing for wireless networks

JY Koh, D Leong, GW Peters, I Nevat… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Privacy-preserving routing protocols in wireless networks frequently utilize additional
artificial traffic to hide the identities of communicating source-destination pairs. Usually, the …

[PDF][PDF] A literature reviewon sniffing attacks in computernetwork

A Kulshrestha, SK Dubey - International Journal of Advanced …, 2014 - academia.edu
In today's modern era, the internet plays very important role among communications of
various stakeholders. Internet creates a link between client and server. But the interface …

Defending against packet-size side-channel attacks in IoT networks

S Xiong, AD Sarwate… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Motivated by privacy issues in the Internet of Things (IoT), we generalize a previously
proposed privacy-preserving packet obfuscation scheme to guarantee differential privacy …

Nori: Concealing the concealed identifier in 5g

J Preuß Mattsson, PK Nakarmi - … of the 16th International Conference on …, 2021 - dl.acm.org
IMSI catchers have been a long standing and serious privacy problem in pre-5G mobile
networks. To tackle this, 3GPP introduced the Subscription Concealed Identifier (SUCI) and …

RETRACTED ARTICLE: Privacy-preserving routing using jointly established protocol in IoT network environment

FZ Zhu, ZY Jiang - EURASIP Journal on Wireless Communications and …, 2023 - Springer
In this paper, network energy assesses the capacity of a node to convey messages to others.
In most cases, network energy is created when two nodes interact with one another. If a …

System and method for transferring packets between kernel modules in different network stacks

SC Abraham - US Patent 11,329,966, 2022 - Google Patents
In general, techniques are described for enhancing communication between kernel modules
operating in different network stacks within the kernel space of the same network device. An …

Preventing Data Leakage and Traffic Optimization in Software-Defined Programmable Networks

SR Vanga, G Babu, VKA Kumar… - … on Innovative Data …, 2023 - ieeexplore.ieee.org
The first widely used communication infrastructure was the telephone network, often known
as a connection-oriented or circuit-switched network. While making a phone call, these …

Secure and automated communication in client and server environment

S Gupta - International Journal of Advanced Computer …, 2013 - search.proquest.com
The unstoppable mass of the Internet and the network-based applications has gratuitous to
obese stability leaks. Soothe the confidential protocols, which are worn to quarter receive …