The Internet of Things: A review of enabled technologies and future challenges
The Internet of Things (IoT) is an emerging classical model, envisioned as a system of
billions of small interconnected devices for posing the state-of-the-art findings to real-world …
billions of small interconnected devices for posing the state-of-the-art findings to real-world …
Key generation for internet of things: A contemporary survey
Key generation is a promising technique to bootstrap secure communications for the Internet
of Things devices that have no prior knowledge between each other. In the past few years, a …
of Things devices that have no prior knowledge between each other. In the past few years, a …
ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems
Despite the growing spread of Internet of Things (IoT) ecosystems, their security assessment
is still an open issue. Identifying threats, vulnerabilities, and attacks is a costly and time …
is still an open issue. Identifying threats, vulnerabilities, and attacks is a costly and time …
One key to rule them all: Secure group pairing for heterogeneous iot devices
Pairing schemes establish cryptographic keys to secure communication among IoT devices.
Existing pairing approaches that rely on trusted central entities, human interaction, or shared …
Existing pairing approaches that rely on trusted central entities, human interaction, or shared …
Sounds Good? Fast and Secure Contact Exchange in Groups
Trustworthy digital communication requires the secure exchange of contact information, but
current approaches lack usability and scalability for larger groups of users. We evaluate the …
current approaches lack usability and scalability for larger groups of users. We evaluate the …
Demystifying authentication concepts in smartphones: Ways and types to secure access
Smartphones are the most popular and widespread personal devices. Apart from their
conventional use, that is, calling and texting, they have also been used to perform multiple …
conventional use, that is, calling and texting, they have also been used to perform multiple …
Proximity detection with single-antenna IoT devices
Providing secure communications between wireless devices that encounter each other on
an ad-hoc basis is a challenge that has not yet been fully addressed. In these cases, close …
an ad-hoc basis is a challenge that has not yet been fully addressed. In these cases, close …
Adversary models for mobile device authentication
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
a vast range of methods proposed and analyzed. In related areas, such as secure channel …
Fastzip: Faster and more secure zero-interaction pairing
With the advent of the Internet of Things (IoT), establishing a secure channel between smart
devices becomes crucial. Recent research proposes zero-interaction pairing (ZIP), which …
devices becomes crucial. Recent research proposes zero-interaction pairing (ZIP), which …
Voltkey: Continuous secret key generation based on power line noise for zero-involvement pairing and authentication
The explosive proliferation of Internet-of-Things (IoT) ecosystem fuels the needs for a
mechanism for the user to easily and securely interconnect multiple heterogeneous devices …
mechanism for the user to easily and securely interconnect multiple heterogeneous devices …