A survey of techniques for the identification of mobile phones using the physical fingerprints of the built-in components

G Baldini, G Steri - IEEE Communications Surveys & Tutorials, 2017 - ieeexplore.ieee.org
In recent years, several research studies have investigated the identification of electronic
devices through their physical components and properties, both from a theoretical point of …

Key generation for internet of things: A contemporary survey

W Xu, J Zhang, S Huang, C Luo, W Li - ACM Computing Surveys (CSUR …, 2021 - dl.acm.org
Key generation is a promising technique to bootstrap secure communications for the Internet
of Things devices that have no prior knowledge between each other. In the past few years, a …

[HTML][HTML] Active volume control in smart phones based on user activity and ambient noise

VD Ambeth Kumar, S Malathi, A Kumar, KC Veluvolu - Sensors, 2020 - mdpi.com
To communicate efficiently with a prospective user, auditory interfaces are employed in
mobile communication devices. Diverse sounds in different volumes are used to alert the …

Magneto: Covert channel between air-gapped systems and nearby smartphones via cpu-generated magnetic fields

M Guri - Future Generation Computer Systems, 2021 - Elsevier
This papers shows that attackers can leak data from isolated, air-gapped computers to
nearby smartphones via covert magnetic signals. The proposed covert channel works even …

Security properties of gait for mobile device pairing

A Bruesch, N Nguyen, D Schürmann… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Gait has been proposed as a feature for mobile device pairing across arbitrary positions on
the human body. Results indicate that the correlation in gait-based features across different …

Smartphone fingerprinting combining features of on-board sensors

I Amerini, R Becarelli, R Caldelli… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Many everyday activities involve the exchange of confidential information through the use of
a smartphone in mobility, ie, sending on e-mail, checking bank account, buying on-line …

BANDANA—Body area network device-to-device authentication using natural gAit

D Schürmann, A Brüsch, S Sigg… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
Secure spontaneous authentication between devices worn at arbitrary locations on the
same body is a challenging, yet unsolved problem. We propose BANDANA, the first-ever …

Proximity detection with single-antenna IoT devices

TJ Pierson, T Peters, R Peterson, D Kotz - The 25th Annual International …, 2019 - dl.acm.org
Providing secure communications between wireless devices that encounter each other on
an ad-hoc basis is a challenge that has not yet been fully addressed. In these cases, close …

Adversary models for mobile device authentication

R Mayrhofer, S Sigg - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Mobile device authentication has been a highly active research topic for over 10 years, with
a vast range of methods proposed and analyzed. In related areas, such as secure channel …

A survey of wearable devices pairing based on biometric signals

J Pourbemany, Y Zhu, R Bettati - IEEE Access, 2023 - ieeexplore.ieee.org
With the rapid growth of wearable devices, more applications require direct communication
between wearable devices. To secure the communication between wearable devices …