1. [1] P. Newman, “THE INTERNET OF THINGS 2020: Here's what over 400 IoT decision-makers say about the future of enterprise connectivity and how IoT companies can use it to grow revenue,” https://www.businessinsider.com/internet-of-things-report, March 2020.
2. [2] N. Apthorpe, D. Reisman, S. Sundaresan, A. Narayanan, and N. Feamster, “Spying on the smart home: Privacy attacks and defenses on encrypted IoT traffic,” arXiv:1708.05044, Aug. 2017.
3. [3] I. Hafeez, M. Antikainen, and S. Tarkoma, “Protecting IoT-environments against traffic analysis attacks with traffic morphing,” IEEE International Conference on Pervasive Computing and Communications Workshops, pp.196-201, March 2019. 10.1109/percomw.2019.8730787
4. [4] A. Acar, H. Fereidooni, T. Abera, A. Sikder, M. Miettinen, H. Aksu, M. Conti, A. Sadeghi, and A. Uluagac, “Peek-a-Boo: I see your smart home activities, even encrypted!,” arXiv:1808.02741, Aug. 2018.
5. [5] F. Zhang, W. He, and X. Liu, “Defending against traffic analysis in wireless networks through traffic reshaping,” International Conference on Distributed Computing, pp.593-602, June 2011. 10.1109/icdcs.2011.77