A survey on privacy and security of Internet of Things
Abstract Internet of Things (IoT) has fundamentally changed the way information technology
and communication environments work, with significant advantages derived from wireless …
and communication environments work, with significant advantages derived from wireless …
T2pair: Secure and usable pairing for heterogeneous iot devices
Secure pairing is key to trustworthy deployment and application of Internet of Things (IoT)
devices. However, IoT devices lack conventional user interfaces, such as keyboards and …
devices. However, IoT devices lack conventional user interfaces, such as keyboards and …
Bag of on-phone ANNs to secure IoT objects using wearable and smartphone biometrics
The introduction of the Internet of Things (IoT) has made several emerging applications, from
financial transactions to property access, possible through IoT-connected smart wearables …
financial transactions to property access, possible through IoT-connected smart wearables …
Touch well before use: Intuitive and secure authentication for iot devices
Internet of Things (IoT) are densely deployed in smart environments, such as homes,
factories and laboratories, where many people have physical access to IoT devices. How to …
factories and laboratories, where many people have physical access to IoT devices. How to …
Periscope: A keystroke inference attack using human coupled electromagnetic emanations
This study presents Periscope, a novel side-channel attack that exploits human-coupled
electromagnetic (EM) emanations from touchscreens to infer sensitive inputs on a mobile …
electromagnetic (EM) emanations from touchscreens to infer sensitive inputs on a mobile …
SonicPrint: A generally adoptable and secure fingerprint biometrics in smart devices
The advent of smart devices has caused unprecedented security and privacy concerns to its
users. Although the fingerprint technology is a go-to biometric solution in high-impact …
users. Although the fingerprint technology is a go-to biometric solution in high-impact …
Thumbup: Identification and authentication by smartwatch using simple hand gestures
The widespread creative application and smart devices call for convenient and secure
interaction with human users. We propose, design, and implement a smartwatch-based two …
interaction with human users. We propose, design, and implement a smartwatch-based two …
Context-dependent implicit authentication for wearable device users
W Cheung, S Vhaduri - … on Personal, Indoor and Mobile Radio …, 2020 - ieeexplore.ieee.org
As market wearables are becoming popular with a range of services, including making
financial transactions, accessing cars, etc. that they provide based on various private …
financial transactions, accessing cars, etc. that they provide based on various private …
Use It-No Need to Shake It! accurate implicit authentication for everyday objects with smart sensing
Implicit authentication for traditional objects, such as doors and dumbbells, has rich
applications but is rarely studied. An ongoing trend is that traditional objects are retrofitted to …
applications but is rarely studied. An ongoing trend is that traditional objects are retrofitted to …
Continuous authentication of wearable device users from heart rate, gait, and breathing data
W Cheung, S Vhaduri - 2020 8th IEEE RAS/EMBS International …, 2020 - ieeexplore.ieee.org
The security of private information is becoming the bedrock of an increasingly digitized
society. While the users are flooded with passwords and PINs, these goldstandard explicit …
society. While the users are flooded with passwords and PINs, these goldstandard explicit …