REFERENCES
Alexopoulos, N., Kiayias, A., Talviste, R., and Zacharias,
T. (2017). Mcmix: Anonymous messaging via secure
multiparty computation. In 26th {USENIX} Security
Symposium ({USENIX} Security 17), pages 1217–
1234.
Beimel, A. and Dolev, S. (2003). Buses for anonymous
message delivery. Journal of Cryptology, 16(1).
Ben Guirat, I., Gosain, D., and Diaz, C. (2021). Mixim:
Mixnet design decisions and empirical evaluation. In
Proceedings of the 20th Workshop on Workshop on
Privacy in the Electronic Society, pages 33–37.
Berger, S., Simsek, M., Fehske, A., Zanier, P., Viering, I.,
and Fettweis, G. (2015). Joint downlink and uplink
tilt-based self-organization of coverage and capacity
under sparse system knowledge. IEEE Transactions
on Vehicular Technology, 65(4):2259–2273.
Centenaro, M. and Vangelista, L. (2015). A study on m2m
traffic and its impact on cellular networks. In 2015
IEEE 2nd World Forum on Internet of Things (WF-
IoT), pages 154–159. IEEE.
Chaum, D. L. (1981). Untraceable electronic mail, return
addresses, and digital pseudonyms. Communications
of the ACM, 24(2):84–90.
Cheng, R., Wu, N., Chen, S., and Han, B. (2022). Will
metaverse be nextg internet? vision, hype, and reality.
arXiv preprint arXiv:2201.12894.
Danezis, G. and Diaz, C. (2008). A survey of anonymous
communication channels. Technical report, Technical
Report MSR-TR-2008-35, Microsoft Research.
Das, D., Meiser, S., Mohammadi, E., and Kate, A. (2018).
Anonymity trilemma: Strong anonymity, low band-
width overhead, low latency-choose two. In 2018
IEEE Symposium on Security and Privacy (SP), pages
108–126. IEEE.
Dester, P. S., dos S Filho, F. H. C., and Cardieri, P. (2018).
Performance analysis of uplink traffic for machine
type communication in wireless sensor networks. In
2018 IEEE 87th Vehicular Technology Conference
(VTC Spring), pages 1–5. IEEE.
Dingledine, R., Mathewson, N., and Syverson, P. (2004).
Tor: The second-generation onion router. Technical
report, Naval Research Lab Washington DC.
Freedman, M. J. and Morris, R. (2002). Tarzan: A peer-
to-peer anonymizing network layer. In Proceedings of
the 9th ACM Conference on Computer and Communi-
cations Security, pages 193–206.
Hirt, A., Jacobson, M., and Williamson, C. (2008). Taxis:
scalable strong anonymous communication. In 2008
IEEE International Symposium on Modeling, Analysis
and Simulation of Computers and Telecommunication
Systems, pages 1–10. IEEE.
Karunanayake, I., Ahmed, N., Malaney, R., Islam, R., and
Jha, S. (2020). Anonymity with tor: A survey on tor
attacks. arXiv preprint arXiv:2009.13018.
Kotzanikolaou, P., Chatzisofroniou, G., and Burmester, M.
(2017). Broadcast anonymous routing (bar): scalable
real-time anonymous communication. International
Journal of Information Security, 16(3):313–326.
Kwon, J.-H., Lee, H.-H., Lim, Y., and Kim, E.-J. (2016).
Dominant channel occupancy for wi-fi backscatter up-
link in industrial internet of things. Applied Sciences,
6(12):427.
Nikaein, N., Marina, M. K., Manickam, S., Dawson, A.,
Knopp, R., and Bonnet, C. (2014). Openairinterface:
A flexible platform for 5g research. ACM SIGCOMM
Computer Communication Review, 44(5):33–38.
Oueis, J. and Strinati, E. C. (2016). Uplink traffic in fu-
ture mobile networks: Pulling the alarm. In Interna-
tional Conference on Cognitive Radio Oriented Wire-
less Networks, pages 583–593. Springer.
Piotrowska, A. M., Hayes, J., Elahi, T., Meiser, S., and
Danezis, G. (2017). The loopix anonymity system.
In 26th {USENIX} Security Symposium ({USENIX}
Security 17), pages 1199–1216.
Shafiq, M. Z., Ji, L., Liu, A. X., Pang, J., and Wang,
J. (2013). Large-scale measurement and char-
acterization of cellular machine-to-machine traffic.
IEEE/ACM transactions on Networking, 21(6):1960–
1973.
Shen, T., Jiang, J., Jiang, Y., Chen, X., Qi, J., Zhao, S.,
Zhang, F., Luo, X., and Cui, H. (2021). Daenet: Mak-
ing strong anonymity scale in a fully decentralized
network. IEEE Transactions on Dependable and Se-
cure Computing, pages 1–1.
Shirazi, F., Simeonovski, M., Asghar, M. R., Backes, M.,
and Diaz, C. (2018). A survey on routing in anony-
mous communication protocols. ACM Computing
Surveys (CSUR), 51(3):1–39.
Sun, Y., Liu, Q., Chen, X., and Du, X. (2020). An adaptive
authenticated data structure with privacy-preserving
for big data stream in cloud. IEEE Transactions on
Information Forensics and Security, 15:3295–3310.
Van Den Hooff, J., Lazar, D., Zaharia, M., and Zeldovich,
N. (2015). Vuvuzela: Scalable private messaging re-
sistant to traffic analysis. In Proceedings of the 25th
Symposium on Operating Systems Principles, pages
137–152.
Xia, Y., Chen, R., Su, J., and Zou, H. (2020). Balancing
anonymity and resilience in anonymous communica-
tion networks. Computers & Security, page 102106.
Yang, H. and Larsson, E. G. (2019). Can massive mimo
support uplink intensive applications? In 2019 IEEE
Wireless Communications and Networking Confer-
ence (WCNC), pages 1–6. IEEE.
Young, A. L. and Yung, M. (2014). The drunk motorcy-
clist protocol for anonymous communication. In 2014
IEEE Conf. on Communications and Network Secu-
rity, pages 157–165. IEEE.
Zantout, B., Haraty, R., et al. (2011). I2p data communica-
tion system. In Proc. of ICN, pages 401–409. Citeseer.
SECRYPT 2023 - 20th International Conference on Security and Cryptography
84