LightningStrike: (in) secure practices of E-IoT systems in the wild

LP Rondon, L Babun, A Aris, K Akkaya… - Proceedings of the 14th …, 2021 - dl.acm.org
The widespread adoption of specialty smart ecosystems has changed the everyday lives of
users. As a part of smart ecosystems, Enterprise Internet of Things (E-IoT) allows users to …

Zero trust access control with context-aware and behavior-based continuous authentication for smart homes

GR da Silva, DF Macedo… - Anais do XXI Simpósio …, 2021 - sol.sbc.org.br
Generally, approaches to build the security of Smart Home Systems (SHS) require big
amount of data to implement Access Control and Intrusion Detection Systems, with storage …

I Know Your Intent: Graph-enhanced Intent-aware User Device Interaction Prediction via Contrastive Learning

J Xiao, Q Zou, Q Li, D Zhao, K Li, Z Weng, R Li… - Proceedings of the …, 2023 - dl.acm.org
With the booming of smart home market, intelligent Internet of Things (IoT) devices have
been increasingly involved in home life. To improve the user experience of smart homes …

Medicolite‐machine learning‐based patient care model

R Khan, AK Srivastava, M Gupta… - Computational …, 2022 - Wiley Online Library
This paper discusses the machine learning effect on healthcare and the development of an
application named “Medicolite” in which various modules have been developed for …

Identification of compromised IoT devices: Combined approach based on energy consumption and network traffic analysis

F Jaafar, D Ameyed, A Barrak… - 2021 IEEE 21st …, 2021 - ieeexplore.ieee.org
In the burgeoning age of digitalization, the Internet of Things presents a core part of the
digital ecosystem. Unfortunately, as the deployment of connected devices is increasing …

On the safety implications of misordered events and commands in IoT systems

F Goksel, MO Ozmen, M Reeves… - 2021 IEEE Security …, 2021 - ieeexplore.ieee.org
IoT devices, equipped with embedded actuators and sensors, provide custom automation in
the form of IoT apps. IoT apps subscribe to events and upon receipt, transmit actuation …

Anomalous behavior detection-based approach for authenticating smart home system users

N Amraoui, B Zouari - International Journal of Information Security, 2022 - Springer
This paper presents Duenna, an authentication framework for smart home systems (SHSs).
When using controlling apps (eg, a smartphone app), Duenna makes sure that only …

Privacy Preservation in Artificial Intelligence and Extended Reality (AI-XR) Metaverses: A Survey

M Alkaeed, A Qayyum, J Qadir - arXiv preprint arXiv:2310.10665, 2023 - arxiv.org
The metaverse is a nascent concept that envisions a virtual universe, a collaborative space
where individuals can interact, create, and participate in a wide range of activities. Privacy in …

On Continuously Verifying Device-level Functional Integrity by Monitoring Correlated Smart Home Devices

S Sunar, P Shirani, S Majumdar, JD Brown - Proceedings of the 17th …, 2024 - dl.acm.org
The correct functionality (can also be called as functional integrity) from a smart device is
essential towards ensuring their safe and secure operations. The functional integrity of a …

Context-aware security in the internet of things: a review

E de Matos, E Viegas, R Tiburski, F Hessel - International Conference on …, 2023 - Springer
Security and privacy are hot topics when considering the Internet of Things (IoT) application
scenarios. By dealing with sensitive and sometimes personal data, IoT application …