{"title":"TOR hidden services for supervising remote embedded systems anonymously","authors":"K. Kodur, Salam Thoi Thoi, W. Arif","doi":"10.1109/MICROCOM.2016.7522536","DOIUrl":null,"url":null,"abstract":"One of the most anonymity centric network, TOR has become a research interest for several applications. As anonymity is very hot topic these days, developing remote administration with untraceable administrator will create huge impact and opportunities for security analysis. The rise of embedded systems, creation of secure server communications and connecting them through TOR will be the dawn of new heavily interconnected embedded systems. Through the creation of hidden services and using it to monitor remote devices could find interesting applications. For example: Land Rover, Home Automation.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MICROCOM.2016.7522536","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
One of the most anonymity centric network, TOR has become a research interest for several applications. As anonymity is very hot topic these days, developing remote administration with untraceable administrator will create huge impact and opportunities for security analysis. The rise of embedded systems, creation of secure server communications and connecting them through TOR will be the dawn of new heavily interconnected embedded systems. Through the creation of hidden services and using it to monitor remote devices could find interesting applications. For example: Land Rover, Home Automation.