Internet of things security: A top-down survey

DE Kouicem, A Bouabdallah, H Lakhlef - Computer Networks, 2018 - Elsevier
Abstract Internet of Things (IoT) is one of the promising technologies that has attracted a lot
of attention in both industrial and academic fields these years. It aims to integrate seamlessly …

Survey of Authentication and Authorization for the Internet of Things

M Trnka, T Cerny, N Stickney - Security and Communication …, 2018 - Wiley Online Library
The Internet of Things is currently getting significant interest from the scientific community.
Academia and industry are both focused on moving ahead in attempts to enhance usability …

Kratos: Multi-user multi-device-aware access control system for the smart home

AK Sikder, L Babun, ZB Celik, A Acar, H Aksu… - Proceedings of the 13th …, 2020 - dl.acm.org
In a smart home system, multiple users have access to multiple devices, typically through a
dedicated app installed on a mobile device. Traditional access control mechanisms consider …

Who's controlling my device? Multi-user multi-device-aware access control system for shared smart home environment

AK Sikder, L Babun, ZB Celik, H Aksu… - ACM Transactions on …, 2022 - dl.acm.org
Multiple users have access to multiple devices in a smart home system–typically through a
dedicated app installed on a mobile device. Traditional access control mechanisms consider …

A survey on recent advanced research of CPS security

Z Wang, W **e, B Wang, J Tao, E Wang - Applied Sciences, 2021 - mdpi.com
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate
computing, communication, and control. Malicious attacks on CPSs can lead to both …

Location proof systems for smart internet of things: Requirements, taxonomy, and comparative analysis

F Zafar, A Khan, A Anjum, C Maple, MA Shah - Electronics, 2020 - mdpi.com
In the current hyper-connected, data-driven era, smart devices are providing access to
geolocation information, enabling a paradigm shift in diverse domains. Location proof …

SoundAuth: Secure zero-effort two-factor authentication based on audio signals

M Wang, WT Zhu, S Yan, Q Wang - 2018 IEEE Conference on …, 2018 - ieeexplore.ieee.org
Two-factor authentication (2FA) popularly works by verifying something the user knows (a
password) and something she possesses (a token, popularly instantiated with a smart …

LocID: A secure and usable location-based smartphone unlocking scheme using Wi-Fi signals and light intensity

MA Alawami, AR Vinay, H Kim - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
A user's location information can be used to identify the user. For example, in Android, we
can keep our smartphone unlocked when it is located near a place that was previously …

LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics

MA Alawami, H Kim - Computers & Security, 2020 - Elsevier
Location-based information has become an attractive attribute for use in many services
including localization, tracking, positioning, and authentication. An additional layer of …

Cross city: Wi-fi location proofs for smart tourism

GA Maia, RL Claro, ML Pardal - Ad-Hoc, Mobile, and Wireless Networks …, 2020 - Springer
The ubiquitousness of smartphones, wearables and other mobile devices, coupled with the
increasing number of communications infrastructure present in smart cities, has led to the …