{"title":"用于匿名监控远程嵌入式系统的TOR隐藏服务","authors":"K. Kodur, Salam Thoi Thoi, W. Arif","doi":"10.1109/MICROCOM.2016.7522536","DOIUrl":null,"url":null,"abstract":"One of the most anonymity centric network, TOR has become a research interest for several applications. As anonymity is very hot topic these days, developing remote administration with untraceable administrator will create huge impact and opportunities for security analysis. The rise of embedded systems, creation of secure server communications and connecting them through TOR will be the dawn of new heavily interconnected embedded systems. Through the creation of hidden services and using it to monitor remote devices could find interesting applications. For example: Land Rover, Home Automation.","PeriodicalId":118902,"journal":{"name":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"TOR hidden services for supervising remote embedded systems anonymously\",\"authors\":\"K. Kodur, Salam Thoi Thoi, W. Arif\",\"doi\":\"10.1109/MICROCOM.2016.7522536\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"One of the most anonymity centric network, TOR has become a research interest for several applications. As anonymity is very hot topic these days, developing remote administration with untraceable administrator will create huge impact and opportunities for security analysis. The rise of embedded systems, creation of secure server communications and connecting them through TOR will be the dawn of new heavily interconnected embedded systems. Through the creation of hidden services and using it to monitor remote devices could find interesting applications. For example: Land Rover, Home Automation.\",\"PeriodicalId\":118902,\"journal\":{\"name\":\"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)\",\"volume\":\"22 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/MICROCOM.2016.7522536\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Microelectronics, Computing and Communications (MicroCom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/MICROCOM.2016.7522536","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
TOR hidden services for supervising remote embedded systems anonymously
One of the most anonymity centric network, TOR has become a research interest for several applications. As anonymity is very hot topic these days, developing remote administration with untraceable administrator will create huge impact and opportunities for security analysis. The rise of embedded systems, creation of secure server communications and connecting them through TOR will be the dawn of new heavily interconnected embedded systems. Through the creation of hidden services and using it to monitor remote devices could find interesting applications. For example: Land Rover, Home Automation.