Filters








550 Hits in 6.2 sec

Survey and Systematization of Secure Device Pairing

Mikhail Fomichev, Flor Alvarez, Daniel Steinmetzer, Paul Gardner-Stephen, Matthias Hollick
2018 IEEE Communications Surveys and Tutorials  
Secure Device Pairing (SDP) schemes have been developed to facilitate secure communications among smart devices, both personal mobile devices and Internet of Things (IoT) devices.  ...  In this article, we survey and analyze a wide range of SDP schemes that are described in the literature, including a number that have been adopted as standards.  ...  ACKNOWLEDGMENT The authors would like to thank Jacqueline Brendel for her insightful discussion on the security of cryptographic protocols used in SDP.  ... 
doi:10.1109/comst.2017.2748278 fatcat:yivmyok3bzfilmkxkpfhdwnbmy

Cross-Device Taxonomy

Frederik Brudy, Christian Holz, Roman Rädle, Chi-Jui Wu, Steven Houben, Clemens Nylandsted Klokmose, Nicolai Marquardt
2019 Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems - CHI '19  
For both new and experienced researchers in the field we provide: an overview, historic trends and unified terminology of cross-device research; discussion of major and under-explored application areas  ...  To inform the future research agenda of this field, we contribute an analysis and taxonomy of a corpus of 510 papers in the crossdevice computing domain.  ...  More research into the mental models of individual devices and larger ecologies is needed to provide an empirical ground for new technical cross-device research.  ... 
doi:10.1145/3290605.3300792 dblp:conf/chi/BrudyHRWHKM19 fatcat:xeo4p3w4kjgghfe6yvug5bahm4

Exploration of Mobile Device Behavior for Mitigating Advanced Persistent Threats (APT): A Systematic Literature Review and Conceptual Framework

Thulfiqar Jabar, Manmeet Mahinderjit Singh
2022 Sensors  
Examples of IoT include mobile devices such as tablets and smartphones. Attacks can take place that impact the confidentiality, integrity, and availability (CIA) of the information.  ...  In this study, the authors present a Systematic Literature Review (SLR) to provide a survey of the existing literature on APT defense mechanisms, find research gaps, and recommend future directions.  ...  Finally, the SLR validates device behavior fingerprinting as a potential technique for ensuring security and privacy in mobile environments.  ... 
doi:10.3390/s22134662 pmid:35808159 pmcid:PMC9269007 fatcat:r64k3f2imnhvdobf4yxvlsywau

Analysis of the duration and energy consumption of AES algorithms on a contiki-based IoT device

Brandon Tsao, Yuhong Liu, Behnam Dezfouli
2019 Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services  
The current IoT and security landscapes lack empirical metrics on encryption algorithm implementations that are optimized for constrained devices, such as encryption/decryption duration and energy consumption  ...  In this paper, we achieve two things. First, we survey for optimized implementations of symmetric encryption algorithms.  ...  From our survey of the state of security of IoT, we found the main issues barring traditional security measures were scalability (in the case of key management and mass node authentication) and resource  ... 
doi:10.1145/3360774.3368202 dblp:conf/mobiquitous/TsaoLD19 fatcat:f4a2xlegrrerbi26lgzushj6cq

A Disaster Management Framework Using Internet of Things-Based Interconnected Devices

Kaljot Sharma, Darpan Anand, Munish Sabharwal, Pradeep Kumar Tiwari, Omar Cheikhrouhou, Tarek Frikha
2021 Mathematical Problems in Engineering  
IoT is a promising technology used in several applications including disaster management. In disaster management, the role of IoT is so important and ubiquitous and could be life-saving.  ...  It shows an implementation of some examples of the application of IoT such as early-warning system for fire detection and earthquake and represents some approaches talking about the application, IoT architecture  ...  areas with the help of modern IoT technologies and AI [34] .  ... 
doi:10.1155/2021/9916440 doaj:c6cfe2ec96ef4136ab2b202c51d1b146 fatcat:xyioyx5l65dbhh2bg5vafyxhnm

A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets [article]

Pedro Miguel Sánchez Sánchez, Jose María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez
2021 arXiv   pre-print
With this goal in mind, a promising research field emerged focusing on creating and managing fingerprints that model the behavior of both the device actions and its components.  ...  scenarios: device identification and device misbehavior detection.  ...  ACKNOWLEDGMENT This work has been partially supported by the Swiss Federal Office for Defence Procurement (armasuisse) (project code Aramis R-3210/047-31), and the Irish Research Council, under the government  ... 
arXiv:2008.03343v2 fatcat:ujj7ka2txvfj7fbawyhloloac4

Table of Contents

2022 IEEE Internet of Things Journal  
Han, and Z. Feng 7619 Modern Authentication Schemes in Smartphones and IoT Devices: An Empirical Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M. T. Ahvanooey, M.  ...  Kim 7715 Channel-Prediction-Based One-Class Mobile IoT Device Authentication . . . . . . . . . . . . . . . H.-M. Wang and Q.-Y.  ... 
doi:10.1109/jiot.2022.3166338 fatcat:g2mg6jjga5gibciaobbpgg25pe

Ubiquitous Acoustic Sensing on Commodity IoT Devices: A Survey [article]

Chao Cai, Rong Zheng, Jun Luo
2021 arXiv   pre-print
In this paper, we present the first systematic survey of recent advances in active acoustic sensing using commodity hardware with a frequency range below 24~\!kHz.  ...  With the proliferation of Internet-of-Things devices, acoustic sensing attracts much attention in recent years.  ...  For instance, modern smartphones utilize two speakers to play stereo audio and employ two microphones to enhance recording qualities.  ... 
arXiv:1901.03450v2 fatcat:h6a2eyhjhzejfmyld5ahx23gmi

Federated Learning and Its Role in the Privacy Preservation of IoT Devices

Tanweer Alam, Ruchi Gupta
2022 Future Internet  
solutions for IoT devices.  ...  We also provide an overview of similar scientific papers and a detailed analysis of the significant difficulties encountered in recent publications.  ...  Data Availability Statement: Data are not used in this manuscript. Conflicts of Interest: The authors declare no conflicts of interest.  ... 
doi:10.3390/fi14090246 fatcat:gf6h3rry7ncylopuohhrbge6te

Automated User Authentication in Wireless Public Key Infrastructure for Mobile Devices using Aadhar card

Krishna Prakasha, Balachandra Muniyal, Vasundhara Acharya
2019 IEEE Access  
Identification and authentication play a significant role in security controls. The manual process of user identification and authentication is time-consuming and tedious.  ...  The proposed research work aims to overcome this drawback and achieve user identification and authentication through an automated method using the Aadhar card.  ...  The proposed scheme can be further applied to IoT and wireless sensor networks to achieve the authentication and secure transmission of messages.  ... 
doi:10.1109/access.2019.2896324 fatcat:qekruagonbb7hbtvfylzukhgsu

Contribution towards intelligent service management in wearable and ubiquitous devices

Pedro Castillejo, José-Fernán Martínez, Lourdes López, Liping Shen, Andrés Muñoz, Tongzhen Zhang
2016 Journal of Ambient Intelligence and Smart Environments  
, a physiological monitoring device and a smartphone.  ...  Introduction There is an increasing number of wearable devices (smartphones, tablets, watches, etc.) that should be taken into account when developing a human monitoring application based on an IoT  ... 
doi:10.3233/ais-150361 fatcat:kfbldsvzxvh7hilodrarbiekj4

Profiling and Improving the Duty-Cycling Performance of Linux-based IoT Devices [article]

Immanuel Amirtharaj, Tai Groot, Behnam Dezfouli
2019 arXiv   pre-print
Minimizing the energy consumption of Linux-based devices is an essential step towards their wide deployment in various IoT scenarios.  ...  In this work we study and improve the amount of time a Linux-based IoT device is powered on to accomplish its tasks.  ...  report the debris carried by rivers and streams.  ... 
arXiv:1808.10097v2 fatcat:ad6cnqt43nefxptjjdhkfkwm6y

Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications

Kenneth Li Minn Ang, Jasmine Kah Phooi Seng, Ericmoore Ngharamike
2022 Future Internet  
Crowdsourcing can play an important role in the Internet of Things (IoT) applications for information sensing and gathering where the participants are equipped with geolocated devices.  ...  They can be merged to form a new and essential platform in crowdsourcing IoT paradigm for data collection from different sources and communication mediums.  ...  Sensing tasks are distributed across anonymous participating mobile devices, verified, anonymized, in this participatory sensing mode. Das et al.  ... 
doi:10.3390/fi14020049 fatcat:o62tjaayyvfnjc75irzkpzu5vy

IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges

Pooja Anand, Yashwant Singh, Arvind Selwal, Mamoun Alazab, Sudeep Tanwar, Neeraj Kumar
2020 IEEE Access  
Motivated by these facts, in this paper, we explore the evolving vulnerabilities in IoT devices. We provide a state-of-the-art survey that addresses multiple dimensions of the IoT realm.  ...  Subsequently, we explore the open-source tools and datasets for the proliferation in research and growth of IoT.  ...  Furthermore, they proposed a data-driven approach for empirical assessment of IoT maliciousness. In addition, the authors drew insightful findings and inferences in various sections of the survey.  ... 
doi:10.1109/access.2020.3022842 fatcat:ifkplk2lsjhupkt4c42fovqpta

Contactless Technologies for Smart Cities: Big Data, IoT, and Cloud Infrastructures

Arunmozhi Manimuthu, Venugopal Dharshini, Ioannis Zografopoulos, M. K. Priyan, Charalambos Konstantinou
2021 SN Computer Science  
Innovations in the field of information and communication technologies (ICT) and the proliferation of big data, internet-of-things (IoT), and cloud (BIC) infrastructures revolutionize the existing agile  ...  Intelligent systems are enhancing city environments and improving their overall performance in all possible aspects.  ...  An empirical survey on urban IoT helps identify the intertwined concept of quality and quantity; improving the quality of the living environment in urban IoT infrastructure will also assist the economic  ... 
doi:10.1007/s42979-021-00719-0 pmid:34151289 pmcid:PMC8193953 fatcat:dvcgnhktrnfktmgrvwaevqolei
« Previous Showing results 1 — 15 out of 550 results