Visitors in smart homes might want to use certain device features, as far as permitted by the device owner (eg, streaming music on a smart speaker). At the same time, protecting access …
S Prange, C George, F Alt - Proceedings of Mensch und Computer 2021, 2021 - dl.acm.org
Smart home devices are on the rise. To provide their rich variety of features, they collect, store and process a considerable amount of (potentially sensitive) user data. However …
Abstract The Internet of things (IoT) is known today as a substantial technology due to variety of its applications resulting in a huge circulation of users' private information. Thus, it poses …
R Raju, M Moh - … in Smart Homes: Architectures, Solutions and …, 2022 - Wiley Online Library
Summary “IoT”(Internet of Things),“IIoT”(Industrial Internet of Things),“CPS”(Cyber‐Physical Systems) are the common terms that are used to describe the ecosystem of these “smart …
In this work, we explore designs and possible threats of current smart home environments to support the design of novel authentication mechanisms. Our work is motivated by the ever …
There has been a rapid increase in the number of Internet of Things (IoT) devices in the last few years, providing a wide range of services such as camera feeds, light controls, and door …
Choosing authentication schemes for a specific purpose is challenging for service providers, developers, and researchers. Previous ratings of technical and objective aspects showed …
AM Gamundani, A Phillips, HN Muyingi - … 8-10, 2018, Proceedings, Part II, 2018 - Springer
Abstract Internet of Things (IoT) authentication for resource-constrained devices thrives under lightweight solutions. The requirements of the lightweight solutions are that, they have …
Abstract The Internet of Things has become one of the most critical technologies of the 21st century, and IoT devices are projected to grow to more than 3 trillion by 2025. IoT technology …