A survey on privacy and security of Internet of Things

MM Ogonji, G Okeyo, JM Wafula - Computer Science Review, 2020 - Elsevier
Abstract Internet of Things (IoT) has fundamentally changed the way information technology
and communication environments work, with significant advantages derived from wireless …

Recent Trends of Authentication Methods in Extended Reality: A Survey

L Hallal, J Rhinelander, R Venkat - Applied System Innovation, 2024 - mdpi.com
Extended Reality (XR) is increasingly gaining momentum in industries such as retail, health,
and education. To protect users' personal data, establishing a secure authentication system …

Blinkey: A two-factor user authentication method for virtual reality devices

H Zhu, W **, M **ao, S Murali, M Li - … of the ACM on Interactive, Mobile …, 2020 - dl.acm.org
Virtual Reality (VR) has shown promising potentials in many applications, such as e-
business, healthcare, and social networking. Rich information regarding user's activities and …

WiONE: One-shot learning for environment-robust device-free user authentication via commodity Wi-Fi in man–machine system

Y Gu, H Yan, M Dong, M Wang, X Zhang… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
User authentication is the first and most critical step in protecting a man-machine system
from a malicious spoofer. However, security and privacy are just like the two sides of one …

Shoulder-surfing resistant authentication for augmented reality

R Düzgün, P Mayer, M Volkamer - Nordic Human-Computer Interaction …, 2022 - dl.acm.org
Augmented Reality (AR) Head-Mounted Displays (HMD) are increasingly used in industry to
digitize processes and enhance user experience by enabling real-time interaction with both …

PrivacyGuard: Exploring Hidden Cross-App Privacy Leakage Threats In IoT Apps

Z Wang, B Luo, F Li - Proceedings on Privacy Enhancing …, 2025 - petsymposium.org
The increasing use of the Internet of Things (IoT) technology has made our lives convenient,
however, it also poses new security and privacy threats. In this work, we study a new type of …

RF-Rhythm: Secure and usable two-factor RFID authentication

J Li, C Wang, A Li, D Han, Y Zhang… - … -IEEE Conference on …, 2020 - ieeexplore.ieee.org
Passive RFID technology is widely used in user authentication and access control. We
propose RF-Rhythm, a secure and usable two-factor RFID authentication system with strong …

Securing PIN‐based authentication in smartwatches with just two gestures

M Guerar, M Migliardi, F Palmieri… - Concurrency and …, 2020 - Wiley Online Library
Smartwatches are becoming increasingly ubiquitous as they offer new capabilities to
develop sophisticated applications that make daily life easier and more convenient for …

Sok: A systematic literature review of knowledge-based authentication on augmented reality head-mounted displays

R Düzgün, N Noah, P Mayer, S Das… - Proceedings of the 17th …, 2022 - dl.acm.org
The adoption of Augmented Reality (AR) technology has increased over the years. AR
enhances various activities for consumers and businesses, particularly in industrial contexts …

TouchAccess: Unlock IoT Devices on Touching by Leveraging Human-Induced EM Emanations

Y Liu, Z Xu, Z Qin, L Ou, W ** - IEEE Transactions on Mobile …, 2024 - ieeexplore.ieee.org
Internet of Things (IoT) devices play essential roles in both industry and daily scenarios.
However, unlike smartphones and computers, IoT devices typically lack conventional user …