Smart locks: Lessons for securing commodity internet of things devices
We examine the security of home smart locks: cyber-physical devices that replace traditional
door locks with deadbolts that can be electronically controlled by mobile devices or the lock …
door locks with deadbolts that can be electronically controlled by mobile devices or the lock …
On addressing RFID/NFC-based relay attacks: An overview
YJ Tu, S Piramuthu - Decision Support Systems, 2020 - Elsevier
Relay attacks generally occur between two entities that communicate with each other
through wireless means. When a relay attack between a honest prover and a honest verifier …
through wireless means. When a relay attack between a honest prover and a honest verifier …
Context-based co-presence detection techniques: A survey
In this paper, we present a systematic survey on the contextual information based proximity
detection techniques. These techniques are heavily used for improving security and usability …
detection techniques. These techniques are heavily used for improving security and usability …
Blockchain for secure location verification
In location-sensitive applications, dishonest users may submit fake location claims to
illegally access a service or obtain benefit. To address this issue, a number of location proof …
illegally access a service or obtain benefit. To address this issue, a number of location proof …
Pasport: A secure and private location proof generation and verification framework
Recently, there has been a rapid growth in location-based systems and applications in
which users submit their location information to service providers in order to gain access to a …
which users submit their location information to service providers in order to gain access to a …
Survey of distance bounding protocols and threats
NFC and RFID are technologies that are more and more present in our life. These
technologies allow a tag to communicate without contact with a reader. In wireless …
technologies allow a tag to communicate without contact with a reader. In wireless …
Deep Learning Methods for Device Identification Using Symbols Trace Plot
Devices authentication is one crucial aspect of any communication system. Recently, the
physical layer approach radio frequency (RF) fingerprinting has gained increased interest as …
physical layer approach radio frequency (RF) fingerprinting has gained increased interest as …
[LIBRO][B] Personalized privacy protection in big data
Over the past few decades, massive volumes of data in digital form have been generated,
collected, and published with the fast booming of high-performance computing devices and …
collected, and published with the fast booming of high-performance computing devices and …
Optimal proximity proofs
Provably secure distance-bounding is a rising subject, yet an unsettled one; indeed, very
few distance-bounding protocols, with formal security proofs, have been proposed. In fact, so …
few distance-bounding protocols, with formal security proofs, have been proposed. In fact, so …
SPARSE: privacy-aware and collusion resistant location proof generation and verification
Recently, there has been an increase in the number of location-based services and
applications. It is common for these applications to provide facilities or rewards for users who …
applications. It is common for these applications to provide facilities or rewards for users who …