The Internet of Things: A review of enabled technologies and future challenges

IU Din, M Guizani, S Hassan, BS Kim, MK Khan… - Ieee …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is an emerging classical model, envisioned as a system of
billions of small interconnected devices for posing the state-of-the-art findings to real-world …

Key generation for internet of things: A contemporary survey

W Xu, J Zhang, S Huang, C Luo, W Li - ACM Computing Surveys (CSUR …, 2021 - dl.acm.org
Key generation is a promising technique to bootstrap secure communications for the Internet
of Things devices that have no prior knowledge between each other. In the past few years, a …

ESSecA: An automated expert system for threat modelling and penetration testing for IoT ecosystems

M Rak, G Salzillo, D Granata - Computers and Electrical Engineering, 2022 - Elsevier
Despite the growing spread of Internet of Things (IoT) ecosystems, their security assessment
is still an open issue. Identifying threats, vulnerabilities, and attacks is a costly and time …

One key to rule them all: Secure group pairing for heterogeneous iot devices

H Farrukh, MO Ozmen, FK Ors… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Pairing schemes establish cryptographic keys to secure communication among IoT devices.
Existing pairing approaches that rely on trusted central entities, human interaction, or shared …

Sounds Good? Fast and Secure Contact Exchange in Groups

F Putz, S Haesler, M Hollick - Proceedings of the ACM on Human …, 2024 - dl.acm.org
Trustworthy digital communication requires the secure exchange of contact information, but
current approaches lack usability and scalability for larger groups of users. We evaluate the …

Demystifying authentication concepts in smartphones: Ways and types to secure access

S Gupta, A Buriro, B Crispo - Mobile Information Systems, 2018 - Wiley Online Library
Smartphones are the most popular and widespread personal devices. Apart from their
conventional use, that is, calling and texting, they have also been used to perform multiple …

Proximity detection with single-antenna IoT devices

TJ Pierson, T Peters, R Peterson, D Kotz - The 25th Annual International …, 2019 - dl.acm.org
Providing secure communications between wireless devices that encounter each other on
an ad-hoc basis is a challenge that has not yet been fully addressed. In these cases, close …

Adversary models for mobile device authentication

R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …

Fastzip: Faster and more secure zero-interaction pairing

M Fomichev, J Hesse, L Almon, T Lippert… - Proceedings of the 19th …, 2021 - dl.acm.org
With the advent of the Internet of Things (IoT), establishing a secure channel between smart
devices becomes crucial. Recent research proposes zero-interaction pairing (ZIP), which …

Voltkey: Continuous secret key generation based on power line noise for zero-involvement pairing and authentication

K Lee, N Klingensmith, S Banerjee, Y Kim - Proceedings of the ACM on …, 2019 - dl.acm.org
The explosive proliferation of Internet-of-Things (IoT) ecosystem fuels the needs for a
mechanism for the user to easily and securely interconnect multiple heterogeneous devices …