Key generation for internet of things: A contemporary survey

W Xu, J Zhang, S Huang, C Luo, W Li - ACM Computing Surveys (CSUR …, 2021 - dl.acm.org
Key generation is a promising technique to bootstrap secure communications for the Internet
of Things devices that have no prior knowledge between each other. In the past few years, a …

Sensor-based continuous authentication of smartphones' users using behavioral biometrics: A contemporary survey

M Abuhamad, A Abusnaina, DH Nyang… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Mobile devices and technologies have become increasingly popular, offering comparable
storage and computational capabilities to desktop computers allowing users to store and …

Wearable devices and IoT

T Poongodi, R Krishnamurthi, R Indrakumari… - A handbook of Internet …, 2020 - Springer
Wearable devices are the significant ubiquitous technology of the Internet of Things in day-to-
day life. The efficient data processing in various devices such as smart clothes, smart …

A survey of wearable devices pairing based on biometric signals

J Pourbemany, Y Zhu, R Bettati - IEEE Access, 2023 - ieeexplore.ieee.org
With the rapid growth of wearable devices, more applications require direct communication
between wearable devices. To secure the communication between wearable devices …

Surface networks

I Kostrikov, Z Jiang, D Panozzo… - Proceedings of the …, 2018 - openaccess.thecvf.com
We study data-driven representations for three-dimensional triangle meshes, which are one
of the prevalent objects used to represent 3D geometry. Recent works have developed …

Shake to communicate: Secure handshake acceleration-based pairing mechanism for wrist worn devices

Q Jiang, X Huang, N Zhang, K Zhang… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
With the booming penetration of wrist worn smart devices in daily lives, a wide range of
applications have been enabled, such as exchanging social information, sharing sports …

Safegait: Safeguarding gait-based key generation against vision-based side channel attack using generative adversarial network

Y Wu, M Hassan, W Hu - Proceedings of the ACM on Interactive, Mobile …, 2022 - dl.acm.org
Recent works have shown that wearable or implanted devices attached at different locations
of the body can generate an identical security key from their independent measurements of …

Electrocardiogram based group device pairing for wearables

G Zhao, Q Jiang, X Liu, X Ma… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The widespread usage of wearables to provide healthcare services prompts the need for
secure group communication among multiple devices using group keys. Gait-based group …

Inaudiblekey: Generic inaudible acoustic signal based key agreement protocol for mobile devices

W Xu, Z Li, W Xue, X Yu, B Wei, J Wang, C Luo… - Proceedings of the 20th …, 2021 - dl.acm.org
Secure Device-to-Device (D2D) communication is becoming increasingly important with the
ever-growing number of Internet-of-Things (IoT) devices in our daily life. To achieve secure …

Secure and usable handshake based pairing for wrist-worn smart devices on different users

G Zhao, Q Jiang, X Huang, X Ma, Y Tian… - Mobile Networks and …, 2021 - Springer
Wrist-worn smart devices are being used to share various sensitive personal information in
various fields such as social, medical treatment, sports, etc. Secure pairing establishing a …