Sounds Good? Fast and Secure Contact Exchange in Groups

F Putz, S Haesler, M Hollick - Proceedings of the ACM on Human …, 2024 - dl.acm.org
Trustworthy digital communication requires the secure exchange of contact information, but
current approaches lack usability and scalability for larger groups of users. We evaluate the …

Physical Side-Channel Attacks against Intermittent Devices

MO Ozmen, H Farrukh, ZB Celik - Proceedings on Privacy …, 2024 - petsymposium.org
Intermittent (batteryless) devices operate solely using energy harvested from their
environment. These devices turn on when they have energy and turn off during energy …

Touchkey: Touch to generate symmetric keys by skin electric potentials induced by powerline radiation

Y Miao, C Gu, Z Yan, SY Chau, R Tan, Q Lin… - Proceedings of the …, 2023 - dl.acm.org
Secure device pairing is important to wearables. Existing solutions either degrade usability
due to the need of specific actions like shaking, or they lack universality due to the need of …

[PDF][PDF] From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover

X Zhang, Y Tu, Y Long, L Shan, MA Elsaadani… - 2024 IEEE Symposium …, 2024 - xialihei.com
This paper studies vulnerabilities at the intersection of wearable devices and automated
control systems. Particularly, we focus on exploiting smart glasses as an entry point and …

A secure federated learning approach to smart microgrid stability prediction

A Reza, A Bose, L Bai - 2023 32nd International Conference on …, 2023 - ieeexplore.ieee.org
This paper addresses the challenges posed by the proliferation of Internet-of-Things (IoT)
based smart grids in modern power systems, which can threaten the stability and security of …

An anonymous and efficient certificateless signature scheme based on blockchain in NDN‐IoT environments

C Wang, X Deng, M Ma, Q Li, H Bai… - Transactions on …, 2024 - Wiley Online Library
Abstract The Named Data Networking (NDN) architecture, known for its caching strategies
and name‐based routing, is an exemplary paradigm for content distribution across Internet …

InaudibleKey2. 0: Deep Learning-Empowered Mobile Device Pairing Protocol Based on Inaudible Acoustic Signals

H Yang, Z Li, C Luo, B Wei, W Xu - IEEE/ACM Transactions on …, 2024 - ieeexplore.ieee.org
The increasing proliferation of Internet-of-Things (IoT) devices in daily life has rendered
secure Device-to-Device (D2D) communication increasingly crucial. Achieving secure D2D …

TurboBlom: A light and resilient key predistribution scheme with application to Internet of Things

M Khabbazian, R Safavi-Naini, A Shabani-Baghani - Plos one, 2024 - journals.plos.org
In the Internet of Things (IoT), there are often devices that are computationally too
constrained to establish a security key using traditional key distribution mechanisms such as …

Harvesting Physical-layer Randomness in Millimeter Wave Bands

Z Xu, J Li, Y Pan, M Li, L Lazos - IEEE Transactions on Mobile …, 2024 - ieeexplore.ieee.org
The unpredictability of the wireless channel has been used as a natural source of
randomness to build physical-layer security primitives for shared key generation …

T2Pair++: Secure and Usable IoT Pairing with Zero Information Loss

C Wu, X Li, L Luo, Q Zeng - arXiv preprint arXiv:2409.16530, 2024 - arxiv.org
Secure pairing is crucial for ensuring the trustworthy deployment and operation of Internet of
Things (IoT) devices. However, traditional pairing methods are often unsuitable for IoT …