Adversary models for mobile device authentication
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
Proobjar: Prototy** spatially-aware interactions of smart objects with ar-hmd
The rapid advances in technologies have brought new interaction paradigms of smart
objects (eg, digital devices) beyond digital device screens. By utilizing spatial properties …
objects (eg, digital devices) beyond digital device screens. By utilizing spatial properties …
Use It-No Need to Shake It! accurate implicit authentication for everyday objects with smart sensing
Implicit authentication for traditional objects, such as doors and dumbbells, has rich
applications but is rarely studied. An ongoing trend is that traditional objects are retrofitted to …
applications but is rarely studied. An ongoing trend is that traditional objects are retrofitted to …
BANDANA—Body area network device-to-device authentication using natural gAit
Secure spontaneous authentication between devices worn at arbitrary locations on the
same body is a challenging, yet unsolved problem. We propose BANDANA, the first-ever …
same body is a challenging, yet unsolved problem. We propose BANDANA, the first-ever …
Security properties of gait for mobile device pairing
Gait has been proposed as a feature for mobile device pairing across arbitrary positions on
the human body. Results indicate that the correlation in gait-based features across different …
the human body. Results indicate that the correlation in gait-based features across different …
Shake to communicate: Secure handshake acceleration-based pairing mechanism for wrist worn devices
With the booming penetration of wrist worn smart devices in daily lives, a wide range of
applications have been enabled, such as exchanging social information, sharing sports …
applications have been enabled, such as exchanging social information, sharing sports …
Harnessing the ambient radio frequency noise for wearable device pairing
Wearable devices that capture user's rich information regarding their health conditions and
daily activities have unmet pairing needs. Today's solutions, which primarily rely on human …
daily activities have unmet pairing needs. Today's solutions, which primarily rely on human …
Continuous user authentication using smartwatch motion sensor data
Smartwatches, which contain an accelerometer and gyroscope, have recently been used to
implement gait/activity-based biometrics. However, many research questions have not been …
implement gait/activity-based biometrics. However, many research questions have not been …
An inaudible voice attack to context-based device authentication in smart IoT systems
J Mao, S Zhu, J Liu - Journal of Systems Architecture, 2020 - Elsevier
As a typical application of Cyber-physical systems (CPS), a smart Internet of Things (IoT)
system integrates computation, networking, and physical processes from embedded …
system integrates computation, networking, and physical processes from embedded …
User identification using deep learning and human activity mobile sensor data
The ownership of user actions in computer and mobile applications is an important concern,
especially when using shared devices. User identification using physical biometric …
especially when using shared devices. User identification using physical biometric …