Survey and systematization of secure device pairing
Secure device pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet of Things …
communications among smart devices, both personal mobile devices and Internet of Things …
On addressing RFID/NFC-based relay attacks: An overview
YJ Tu, S Piramuthu - Decision Support Systems, 2020 - Elsevier
Relay attacks generally occur between two entities that communicate with each other
through wireless means. When a relay attack between a honest prover and a honest verifier …
through wireless means. When a relay attack between a honest prover and a honest verifier …
Improving the diagnosis of liver disease using multilayer perceptron neural network and boosted decision trees
Early detection of liver disease is never easy, though it is one of the most important diseases
on earth. This study, thus, attempts to achieve efficient early detection through a Multilayer …
on earth. This study, thus, attempts to achieve efficient early detection through a Multilayer …
Context-based co-presence detection techniques: A survey
In this paper, we present a systematic survey on the contextual information based proximity
detection techniques. These techniques are heavily used for improving security and usability …
detection techniques. These techniques are heavily used for improving security and usability …
Non-invasive challenge response authentication for voice transactions with smart home behavior
V Hayashi, W Ruggiero - Sensors, 2020 - mdpi.com
Smart speakers, such as Alexa and Google Home, support daily activities in smart home
environments. Even though voice commands enable friction-less interactions, existing …
environments. Even though voice commands enable friction-less interactions, existing …
You foot the bill! Attacking NFC with passive relays
Imagine when you line up in a store, the person in front of you can make you pay her bill by
using a passive wearable device that forces a scan of your credit card or mobile phones …
using a passive wearable device that forces a scan of your credit card or mobile phones …
Notice of Retraction: Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags
Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags Page 1 Document
Retracted from IEEE Xplore® After careful and considered review of the content of this paper by …
Retracted from IEEE Xplore® After careful and considered review of the content of this paper by …
Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study
Near-Field Communication (NFC) has enabled mobile devices to emulate contactless smart
cards, which has also rendered them susceptible to relay attacks. Numerous …
cards, which has also rendered them susceptible to relay attacks. Numerous …
[PDF][PDF] A side-channel analysis of sensor multiplexing for covert channels and application fingerprinting on mobile devices
Mobile devices often distribute measurements from a single physical sensor to multiple
applications using software-based multiplexing. On Android devices, the highest requested …
applications using software-based multiplexing. On Android devices, the highest requested …
Cyber-physical intrusion detection for robotic vehicles
TP Vuong - 2017 - gala.gre.ac.uk
Intrusion detection systems (IDS) designed for conventional computer systems and networks
are not necessarily suitable for mobile cyber-physical systems (CPS), such as robots, drones …
are not necessarily suitable for mobile cyber-physical systems (CPS), such as robots, drones …