Blockchain‐based applications provide many promising opportunities to overcome the challenges associated with the Internet of Things (IoT) ecosystems (eg, centralized …
In the current centralized IoT ecosystems, all financial transactions are routed through IoT platform providers. The security and privacy issues are inevitable with an untrusted or …
X Zhang, S Jiang, Y Liu, T Jiang… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The maturity in information technology and new energy technologies enables participants to generate, buy, and sell energy in energy trading systems. Although applying blockchain …
Inexpensive WiFi-capable hardware can be nowadays easily used to capture traffic from end users and extract knowledge. Such knowledge can be leveraged to support advanced …
Indoor positioning based on Wi-Fi signals has gained a lot of attention lately. There are many advantages related to the use of Wi-Fi signals for positioning, including the availability …
The recent spread of everyday-carried Wi-Fi-enabled devices (smartphones, tablets and wearable devices) comes with a privacy threat to their owner, and to society as a whole …
A Ye, Q Li, Q Zhang, B Cheng - IEEE Access, 2020 - ieeexplore.ieee.org
WLAN-based localization is widely adopted for mobile positioning, which is the prerequisite for location based services and more. However, the existing positioning systems are …
One of the advanced Man-in-the-Middle (MitM) attacks is the Multi-Channel MitM (MC-MitM) attack, which is capable of manipulating encrypted wireless frames between clients and the …
We propose a method for classifying Wi-Fi enabled mobile handheld devices (smartphones) and non-handheld devices (laptops) in a completely passive way, that is resorting neither to …