Internet of things security: A top-down survey
DE Kouicem, A Bouabdallah, H Lakhlef - Computer Networks, 2018 - Elsevier
Abstract Internet of Things (IoT) is one of the promising technologies that has attracted a lot
of attention in both industrial and academic fields these years. It aims to integrate seamlessly …
of attention in both industrial and academic fields these years. It aims to integrate seamlessly …
Survey of Authentication and Authorization for the Internet of Things
The Internet of Things is currently getting significant interest from the scientific community.
Academia and industry are both focused on moving ahead in attempts to enhance usability …
Academia and industry are both focused on moving ahead in attempts to enhance usability …
Kratos: Multi-user multi-device-aware access control system for the smart home
In a smart home system, multiple users have access to multiple devices, typically through a
dedicated app installed on a mobile device. Traditional access control mechanisms consider …
dedicated app installed on a mobile device. Traditional access control mechanisms consider …
Who's controlling my device? Multi-user multi-device-aware access control system for shared smart home environment
Multiple users have access to multiple devices in a smart home system–typically through a
dedicated app installed on a mobile device. Traditional access control mechanisms consider …
dedicated app installed on a mobile device. Traditional access control mechanisms consider …
A survey on recent advanced research of CPS security
Z Wang, W **e, B Wang, J Tao, E Wang - Applied Sciences, 2021 - mdpi.com
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate
computing, communication, and control. Malicious attacks on CPSs can lead to both …
computing, communication, and control. Malicious attacks on CPSs can lead to both …
Location proof systems for smart internet of things: Requirements, taxonomy, and comparative analysis
In the current hyper-connected, data-driven era, smart devices are providing access to
geolocation information, enabling a paradigm shift in diverse domains. Location proof …
geolocation information, enabling a paradigm shift in diverse domains. Location proof …
SoundAuth: Secure zero-effort two-factor authentication based on audio signals
M Wang, WT Zhu, S Yan, Q Wang - 2018 IEEE Conference on …, 2018 - ieeexplore.ieee.org
Two-factor authentication (2FA) popularly works by verifying something the user knows (a
password) and something she possesses (a token, popularly instantiated with a smart …
password) and something she possesses (a token, popularly instantiated with a smart …
LocID: A secure and usable location-based smartphone unlocking scheme using Wi-Fi signals and light intensity
A user's location information can be used to identify the user. For example, in Android, we
can keep our smartphone unlocked when it is located near a place that was previously …
can keep our smartphone unlocked when it is located near a place that was previously …
LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics
Location-based information has become an attractive attribute for use in many services
including localization, tracking, positioning, and authentication. An additional layer of …
including localization, tracking, positioning, and authentication. An additional layer of …
Cross city: Wi-fi location proofs for smart tourism
The ubiquitousness of smartphones, wearables and other mobile devices, coupled with the
increasing number of communications infrastructure present in smart cities, has led to the …
increasing number of communications infrastructure present in smart cities, has led to the …