Exploring the applications and security threats of Internet of Thing in the cloud computing paradigm: A comprehensive study on the cloud of things

A Nag, MM Hassan, A Das, A Sinha… - Transactions on …, 2024 - Wiley Online Library
Abstract The term “Internet of Things”(IoT) represents a vast interconnected network
comprising ordinary objects enhanced with electronics like sensors, actuators, and wireless …

Resilient intermediary-based key exchange protocol for IoT

Z Hu, J Li, C Wilson - ACM Transactions on Internet of Things, 2024 - dl.acm.org
Due to the limited resources of Internet of Things (IoT) devices, Symmetric Key Cryptography
(SKC) is typically favored over resource-intensive Public Key Cryptography (PKC) to secure …

Mimicking DH Key Exchange Over a Full Duplex Wireless Channel via Bisparse Blind Deconvolution

G Wunder, A Flinth, D Becker… - 2023 6th International …, 2023 - ieeexplore.ieee.org
Secret key generation between authenticated devices is a pivotal task for secure
communications. Diffie-Hellman (DH) is de-facto standard but not post-quantum secure. In …

Toward a resilient key exchange protocol for IoT

Z Hu, J Li, S Mergendahl, C Wilson - … of the Twelfth ACM Conference on …, 2022 - dl.acm.org
In order for resource-constrained Internet of Things (IoT) devices to set up secure
communication channels to exchange confidential messages, Symmetric Key Cryptography …

WVC: Towards Secure Device Paring for Mobile Augmented Reality

Q Zhang, Z Yang, F Li, B Zhu, P Chen - ACM Transactions on Sensor …, 2023 - dl.acm.org
In mobile augmented reality applications, how to build a secure device connection between
two previously unassociated devices without prior set-up is challenging, which also refers to …

TONARI: Reactive Detection of Close Physical Contact Using Unlicensed LPWAN Signals

C Shao, O Muta - ACM Transactions on Internet of Things, 2024 - dl.acm.org
Recognizing if two objects are in close physical contact (CPC) is the basis of various Internet-
of-Things services such as vehicle proximity alert and radiation exposure reduction. This is …

Perfectly Secure Key Agreement Over a Full Duplex Wireless Channel

G Wunder, A Flinth, D Becker, B Groß - arxiv preprint arxiv:2404.06952, 2024 - arxiv.org
Secret key generation (SKG) between authenticated devices is a pivotal task for secure
communications. Diffie-Hellman (DH) is de-facto standard but not post-quantum secure. In …

Dude, are you approaching me? Detecting close physical contact via unlicensed LPWAN signals

C Shao, O Muta - 2021 IEEE International Conference on …, 2021 - ieeexplore.ieee.org
Recognizing if two objects are in close physical contact (CPC) is the basis of various Internet-
of-Mobile-Things services such as vehicle proximity alert and radiation exposure reduction …

Cryptography, Dependability and Privacy in Decentralized Systems

Z Hu - 2023 - search.proquest.com
Decentralized systems are distributed systems that disperse computation tasks to multiple
parties without relying on a trusted central authority. Since any party can be attacked and …