A comprehensive survey of modern symmetric cryptographic solutions for resource constrained environments

JH Kong, LM Ang, KP Seng - Journal of Network and Computer …, 2015 - Elsevier
Modern cryptographic algorithms play an irreplaceable role in data communication systems
for various areas of applications. These algorithms are the backbone of data protection and …

Survey and systematization of secure device pairing

M Fomichev, F Alvarez, D Steinmetzer… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Secure device pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet of Things …

A simpler, safer programming and execution model for intermittent systems

B Lucia, B Ransford - ACM SIGPLAN Notices, 2015 - dl.acm.org
Energy harvesting enables novel devices and applications without batteries, but intermittent
operation under energy harvesting poses new challenges to memory consistency that …

Sok: Security and privacy in implantable medical devices and body area networks

M Rushanan, AD Rubin, DF Kune… - 2014 IEEE symposium …, 2014 - ieeexplore.ieee.org
Balancing security, privacy, safety, and utility is a necessity in the health care domain, in
which implantable medical devices (IMDs) and body area networks (BANs) have made it …

Bringing gesture recognition to all devices

B Kellogg, V Talla, S Gollakota - 11th USENIX Symposium on Networked …, 2014 - usenix.org
Existing gesture-recognition systems consume significant power and computational
resources that limit how they may be used in low-end devices. We introduce AllSee, the first …

Recognizing daily activities with RFID-based sensors

M Buettner, R Prasad, M Philipose… - Proceedings of the 11th …, 2009 - dl.acm.org
We explore a dense sensing approach that uses RFID sensor network technology to
recognize human activities. In our setting, everyday objects are instrumented with UHF RFID …

Experimental results with two wireless power transfer systems

A Sample, JR Smith - 2009 IEEE radio and wireless …, 2009 - ieeexplore.ieee.org
This paper describes two wireless power transfer systems. The Wireless Identification and
Sensing Platform (WISP) is a platform for sensing and computation that is powered and read …

[PDF][PDF] Dewdrop: An {Energy-Aware} Runtime for Computational {RFID}

M Buettner, B Greenstein, D Wetherall - 8th USENIX Symposium on …, 2011 - usenix.org
Computational RFID (CRFID) tags embed sensing and computation into the physical world.
The operation of the tags is limited by the RF energy that can be harvested from a nearby …

Comparing and fusing different sensor modalities for relay attack resistance in zero-interaction authentication

HTT Truong, X Gao, B Shrestha… - 2014 IEEE …, 2014 - ieeexplore.ieee.org
Zero-Interaction Authentication (ZIA) refers to approaches that authenticate a user to a
verifier (terminal) without any user interaction. Currently deployed ZIA solutions are …

Location-aware and safer cards: enhancing RFID security and privacy via location sensing

D Ma, AK Prasad, N Saxena, T **ang - … of the fifth ACM conference on …, 2012 - dl.acm.org
In this paper, we report on a new approach for enhancing security and privacy in certain
RFID applications whereby location or location-related information (such as speed) can …