A survey on privacy and security of Internet of Things

MM Ogonji, G Okeyo, JM Wafula - Computer Science Review, 2020 - Elsevier
Abstract Internet of Things (IoT) has fundamentally changed the way information technology
and communication environments work, with significant advantages derived from wireless …

T2pair: Secure and usable pairing for heterogeneous iot devices

X Li, Q Zeng, L Luo, T Luo - Proceedings of the 2020 acm sigsac …, 2020 - dl.acm.org
Secure pairing is key to trustworthy deployment and application of Internet of Things (IoT)
devices. However, IoT devices lack conventional user interfaces, such as keyboards and …

Bag of on-phone ANNs to secure IoT objects using wearable and smartphone biometrics

S Vhaduri, W Cheung, SV Dibbo - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
The introduction of the Internet of Things (IoT) has made several emerging applications, from
financial transactions to property access, possible through IoT-connected smart wearables …

Touch well before use: Intuitive and secure authentication for iot devices

X Li, F Yan, F Zuo, Q Zeng, L Luo - The 25th annual international …, 2019 - dl.acm.org
Internet of Things (IoT) are densely deployed in smart environments, such as homes,
factories and laboratories, where many people have physical access to IoT devices. How to …

Periscope: A keystroke inference attack using human coupled electromagnetic emanations

W **, S Murali, H Zhu, M Li - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
This study presents Periscope, a novel side-channel attack that exploits human-coupled
electromagnetic (EM) emanations from touchscreens to infer sensitive inputs on a mobile …

SonicPrint: A generally adoptable and secure fingerprint biometrics in smart devices

AS Rathore, W Zhu, A Daiyan, C Xu, K Wang… - Proceedings of the 18th …, 2020 - dl.acm.org
The advent of smart devices has caused unprecedented security and privacy concerns to its
users. Although the fingerprint technology is a go-to biometric solution in high-impact …

Thumbup: Identification and authentication by smartwatch using simple hand gestures

X Yu, Z Zhou, M Xu, X You, XY Li - 2020 IEEE international …, 2020 - computer.org
The widespread creative application and smart devices call for convenient and secure
interaction with human users. We propose, design, and implement a smartwatch-based two …

Context-dependent implicit authentication for wearable device users

W Cheung, S Vhaduri - … on Personal, Indoor and Mobile Radio …, 2020 - ieeexplore.ieee.org
As market wearables are becoming popular with a range of services, including making
financial transactions, accessing cars, etc. that they provide based on various private …

Use It-No Need to Shake It! accurate implicit authentication for everyday objects with smart sensing

C Wu, X Li, F Zuo, L Luo, X Du, J Di… - Proceedings of the ACM on …, 2022 - dl.acm.org
Implicit authentication for traditional objects, such as doors and dumbbells, has rich
applications but is rarely studied. An ongoing trend is that traditional objects are retrofitted to …

Continuous authentication of wearable device users from heart rate, gait, and breathing data

W Cheung, S Vhaduri - 2020 8th IEEE RAS/EMBS International …, 2020 - ieeexplore.ieee.org
The security of private information is becoming the bedrock of an increasingly digitized
society. While the users are flooded with passwords and PINs, these goldstandard explicit …