Clap on, clap off: usability of authentication methods in the smart home

W He, J Hainline, R Padhi, B Ur - … of the Interactive Workshop on the …, 2018 - par.nsf.gov
Despite rapid advancements in authentication technologies, little user testing has been
conducted on the various authentication methods proposed for smart homes. Users' …

“Where did you first meet the owner?”–Exploring Usable Authentication for Smart Home Visitors

S Prange, S Delgado Rodriguez, T Doeding… - CHI Conference on …, 2022 - dl.acm.org
Visitors in smart homes might want to use certain device features, as far as permitted by the
device owner (eg, streaming music on a smart speaker). At the same time, protecting access …

Design considerations for usable authentication in smart homes

S Prange, C George, F Alt - Proceedings of Mensch und Computer 2021, 2021 - dl.acm.org
Smart home devices are on the rise. To provide their rich variety of features, they collect,
store and process a considerable amount of (potentially sensitive) user data. However …

Toward the Selection of a Lightweight Authentication Technique for the Security of Smart Homes: Framework Architecture Based on a User Centric Design

TK Araghi, D Megías, A Rosales - Science and Information Conference, 2023 - Springer
Abstract The Internet of things (IoT) is known today as a substantial technology due to variety
of its applications resulting in a huge circulation of users' private information. Thus, it poses …

Smart home device security: A survey of smart home authentication methods with a focus on mutual authentication and key management practices

R Raju, M Moh - … in Smart Homes: Architectures, Solutions and …, 2022 - Wiley Online Library
Summary “IoT”(Internet of Things),“IIoT”(Industrial Internet of Things),“CPS”(Cyber‐Physical
Systems) are the common terms that are used to describe the ecosystem of these “smart …

Vision: Exploring challenges and opportunities for usable authentication in the smart home

S Prange, E Von Zezschwitz… - 2019 IEEE European …, 2019 - ieeexplore.ieee.org
In this work, we explore designs and possible threats of current smart home environments to
support the design of novel authentication mechanisms. Our work is motivated by the ever …

Design and implementation of a contextual-based continuous authentication framework for smart homes

Y Ashibani, D Kauling, QH Mahmoud - Applied System Innovation, 2019 - mdpi.com
There has been a rapid increase in the number of Internet of Things (IoT) devices in the last
few years, providing a wide range of services such as camera feeds, light controls, and door …

That Depends--Assessing User Perceptions of Authentication Schemes across Contexts of Use

V Zimmermann, P Gerber, A Stöver - arXiv preprint arXiv:2209.13958, 2022 - arxiv.org
Choosing authentication schemes for a specific purpose is challenging for service providers,
developers, and researchers. Previous ratings of technical and objective aspects showed …

A Review and Costing of Lightweight Authentication Schemes for Internet of Things (IoT): Towards Design of an Authentication Architecture for Smart Home …

AM Gamundani, A Phillips, HN Muyingi - … 8-10, 2018, Proceedings, Part II, 2018 - Springer
Abstract Internet of Things (IoT) authentication for resource-constrained devices thrives
under lightweight solutions. The requirements of the lightweight solutions are that, they have …

Examining Internet of Things: Smart Place Mitigative Authentication Factors

JL Marquez - 2024 - search.proquest.com
Abstract The Internet of Things has become one of the most critical technologies of the 21st
century, and IoT devices are projected to grow to more than 3 trillion by 2025. IoT technology …