Acknowledgement
이 논문은 2022년 정부(방위사업청)의 재원으로 국방과학연구소의 지원을 받아 수행된 연구임(UI220040XD)
References
- Norwich University Online, Deep Web Crime Requires New Forensic Approaches[Internet], https://online.norwich.edu/academic-programs/resources/deep-web-crime-requires-new-forensic-approaches
- S. C. Jang, "Basic Study on the IoT Micro Boiler," Journal of Internet of Things and Convergence, Vol.8, No.1, pp.23-29, 2022. https://doi.org/10.20465/KIOTS.2022.8.1.023
- T. K. Kim, "IoT (Internet of Things)-based Smart Trash Can," Journal of Internet of Things and Convergence, Vol.6, No.1, pp.17-22, 2020.
- S. Lee and K. Cho, "Seeking an Approach to Youth Job Search Allowance Support Project using IoT in the Untact Era," Journal of Internet of Things and Convergence, Vol.6, No.3, pp.21-30, 2020.
- I. G. Han, J. H. Yeon, H. Y. Lee and H. J. Kim, "Concept of a Layer for Privacy Protection of Upstream Communications in IoT Environments," In Proceedings of the Korea Information Processing Society Conference, pp. 468-469, 2019.
- Tor Network Reachs Internet of Things[Internet], https://www.hwlibre.com/ko/la-red-tor-llega-al-internet-las-cosas/
- E. Erdin, C. Zachor and M. H. Gunes, "How to find hidden users: A survey of attacks on anonymity networks," IEEE Communications Surveys & Tutorials, Vol.17, No.4, pp.2296-2316, 2015. https://doi.org/10.1109/COMST.2015.2453434
- A. Houmansadr, N. Kiyavash and N. Borisov, "Non-Blind Watermarking of Network Flows," IEEE/ACM Transactions on Networking, Vol.22, No.4, pp.1232-1244, 2013. https://doi.org/10.1109/tnet.2013.2272740
- A. Houmansadr and N. Borisov, "SWIRL: A Scalable Watermark to Detect Correlated Network Flows," In NDSS, 2011.
- X. Wang, J. Luo, M. Yang and Z. Ling, "A novel flow multiplication attack against Tor,"?In 2009 13th International Conference on Computer Supported Cooperative Work in Design, Santiago, pp.686-691, 2009, Dissertations.
- Z. Ling, J. Luo, W. Yu, X. Fu, D. Xuan and W. Jia, "A New Cell-Counting-Based Attack Against Tor," in IEEE/ACM Transactions on Networking, Vol.20, No.4, pp.1245-1261, 2012. https://doi.org/10.1109/TNET.2011.2178036
- Z. Ling, X. Fu, W. Jia, W. Yu and D. Xuan, "Novel packet size based covert channel attack against anonymizer," IEEE Transactions on Computers, Vol.62, pp. 186-190, 2013. https://doi.org/10.1109/TC.2011.208
- Z. Ling, J. Luo, W. Yu, X. Fu, W. Jia and W. Zhao, "Protocol-level attacks against Tor," Computer Networks, Vol.57, No.4, pp.869-886, 2013. https://doi.org/10.1016/j.comnet.2012.11.005
- K. Kiran, S. Saurabh, M. Usman, P. D. Shenoy and K. R. Venugopal, "Anonymity and performance analysis of stream isolation in tor network," In 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT) pp.1-6, 2019.
- Rob Jansen, New Foundations for Tor Network Experimentation[Internet], https://blog.torproject.org/new-foundations-tor-network-experimentation/