[HTML][HTML] The digital harms of smart home devices: A systematic literature review

D Buil-Gil, S Kemp, S Kuenzel, L Coventry… - Computers in Human …, 2023 - Elsevier
The connection of home electronic devices to the internet allows remote control of physical
devices and involves the collection of large volumes of data. With the increase in the uptake …

Achieving efficient energy-aware security in IoT networks: a survey of recent solutions and research challenges

M Mahamat, G Jaber, A Bouabdallah - Wireless Networks, 2023 - Springer
The advent of the Internet of Things (IoT), with thousands of connected, heterogeneous, and
energy-constrained devices, enables new application domains and improves our everyday …

Energy consumption of on-device machine learning models for IoT intrusion detection

N Tekin, A Acar, A Aris, AS Uluagac, VC Gungor - Internet of Things, 2023 - Elsevier
Abstract Recently, Smart Home Systems (SHSs) have gained enormous popularity with the
rapid development of the Internet of Things (IoT) technologies. Besides offering many …

Detecting unknown encrypted malicious traffic in real time via flow interaction graph analysis

C Fu, Q Li, K Xu - arXiv preprint arXiv:2301.13686, 2023 - arxiv.org
In this paper, we propose HyperVision, a realtime unsupervised machine learning (ML)
based malicious traffic detection system. Particularly, HyperVision is able to detect unknown …

[PDF][PDF] Evasion attacks and defenses on smart home physical event verification

MO Ozmen, R Song, H Farrukh, ZB Celik - Network and Distributed …, 2023 - par.nsf.gov
In smart homes, when an actuator's state changes, it sends an event notification to the IoT
hub to report this change (eg, the door is unlocked). Prior works have shown that event …

{ARGUS}:{Context-Based} Detection of Stealthy {IoT} Infiltration Attacks

P Rieger, M Chilese, R Mohamed, M Miettinen… - 32nd USENIX Security …, 2023 - usenix.org
IoT application domains, device diversity and connectivity are rapidly growing. IoT devices
control various functions in smart homes and buildings, smart cities, and smart factories …

One key to rule them all: Secure group pairing for heterogeneous iot devices

H Farrukh, MO Ozmen, FK Ors… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Pairing schemes establish cryptographic keys to secure communication among IoT devices.
Existing pairing approaches that rely on trusted central entities, human interaction, or shared …

[HTML][HTML] An intelligent context-aware threat detection and response model for smart cyber-physical systems

Z Noor, S Hina, F Hayat, GA Shah - Internet of Things, 2023 - Elsevier
Smart cities, businesses, workplaces, and even residences have all been converged by the
Internet of Things (IoT). The types and characteristics of these devices vary depending on …

Iotbeholder: A privacy snooping attack on user habitual behaviors from smart home wi-fi traffic

Q Zou, Q Li, R Li, Y Huang, G Tyson, J Xiao… - Proceedings of the ACM …, 2023 - dl.acm.org
With the deployment of a growing number of smart home IoT devices, privacy leakage has
become a growing concern. Prior work on privacy-invasive device localization, classification …

Privacy Preservation in Artificial Intelligence and Extended Reality (AI-XR) Metaverses: A Survey

M Alkaeed, A Qayyum, J Qadir - arXiv preprint arXiv:2310.10665, 2023 - arxiv.org
The metaverse is a nascent concept that envisions a virtual universe, a collaborative space
where individuals can interact, create, and participate in a wide range of activities. Privacy in …