Smart locks: Lessons for securing commodity internet of things devices

G Ho, D Leung, P Mishra, A Hosseini, D Song… - Proceedings of the 11th …, 2016 - dl.acm.org
We examine the security of home smart locks: cyber-physical devices that replace traditional
door locks with deadbolts that can be electronically controlled by mobile devices or the lock …

On addressing RFID/NFC-based relay attacks: An overview

YJ Tu, S Piramuthu - Decision Support Systems, 2020 - Elsevier
Relay attacks generally occur between two entities that communicate with each other
through wireless means. When a relay attack between a honest prover and a honest verifier …

Context-based co-presence detection techniques: A survey

M Conti, C Lal - Computers & Security, 2020 - Elsevier
In this paper, we present a systematic survey on the contextual information based proximity
detection techniques. These techniques are heavily used for improving security and usability …

Blockchain for secure location verification

MR Nosouhi, S Yu, W Zhou, M Grobler… - Journal of Parallel and …, 2020 - Elsevier
In location-sensitive applications, dishonest users may submit fake location claims to
illegally access a service or obtain benefit. To address this issue, a number of location proof …

Pasport: A secure and private location proof generation and verification framework

MR Nosouhi, K Sood, S Yu, M Grobler… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Recently, there has been a rapid growth in location-based systems and applications in
which users submit their location information to service providers in order to gain access to a …

Survey of distance bounding protocols and threats

A Brelurut, D Gerault, P Lafourcade - … Ferrand, France, October 26-28, 2015 …, 2016 - Springer
NFC and RFID are technologies that are more and more present in our life. These
technologies allow a tag to communicate without contact with a reader. In wireless …

Deep Learning Methods for Device Identification Using Symbols Trace Plot

D Huang, A Al-Hourani, K Sithamparanathan… - arxiv preprint arxiv …, 2023 - arxiv.org
Devices authentication is one crucial aspect of any communication system. Recently, the
physical layer approach radio frequency (RF) fingerprinting has gained increased interest as …

[LIBRO][B] Personalized privacy protection in big data

Y Qu, MR Nosouhi, L Cui, S Yu - 2021 - Springer
Over the past few decades, massive volumes of data in digital form have been generated,
collected, and published with the fast booming of high-performance computing devices and …

Optimal proximity proofs

I Boureanu, S Vaudenay - International Conference on Information …, 2014 - Springer
Provably secure distance-bounding is a rising subject, yet an unsettled one; indeed, very
few distance-bounding protocols, with formal security proofs, have been proposed. In fact, so …

SPARSE: privacy-aware and collusion resistant location proof generation and verification

MR Nosouhi, S Yu, M Grobler… - 2018 IEEE Global …, 2018 - ieeexplore.ieee.org
Recently, there has been an increase in the number of location-based services and
applications. It is common for these applications to provide facilities or rewards for users who …