Copyright © 2025 Authors retain the copyright of this article. This article is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
@article{144489, author = {Dr.Padmaja.Pulicherla}, title = {An Enactmenton Privacy Vulnerabilities of Encrypted IoT Traffic }, journal = {International Journal of Innovative Research in Technology}, year = {}, volume = {3}, number = {11}, pages = {312-315}, issn = {2349-6002}, url = {https://ijirt.org/article?manuscript=144489}, abstract = {The growing marketplace for clever home IoTdevices guarantees new conveniences for customers at the same time asimparting new challenges for keeping privateness inside the home. Internet of Things (IoT) devices regularly performs unique features, which can lead them to prone to attackers looking for to research sensitive consumer facts. In precise,user pastime can be inferred simply by using looking for peaks in visitors despatched via IoT devices. Because this kind of inference is basedon the shape of the traffic in preference to the data being sent, encryption does not protect against it. Our aim isto arm the builders of IoT device software with a library that they can use to obfuscate the traffic that their devicesship to save you this sort of attack.}, keywords = {Privacy, Internet-of-things, smart homes,traffic analysis}, month = {}, }
Cite This Article
Submit your research paper and those of your network (friends, colleagues, or peers) through your IPN account, and receive 800 INR for each paper that gets published.
Join NowNational Conference on Sustainable Engineering and Management - 2024 Last Date: 15th March 2024
Submit inquiry