Survey and systematization of secure device pairing

M Fomichev, F Alvarez, D Steinmetzer… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Secure device pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet of Things …

On addressing RFID/NFC-based relay attacks: An overview

YJ Tu, S Piramuthu - Decision Support Systems, 2020 - Elsevier
Relay attacks generally occur between two entities that communicate with each other
through wireless means. When a relay attack between a honest prover and a honest verifier …

Improving the diagnosis of liver disease using multilayer perceptron neural network and boosted decision trees

M Abdar, NY Yen, JCS Hung - Journal of Medical and Biological …, 2018 - Springer
Early detection of liver disease is never easy, though it is one of the most important diseases
on earth. This study, thus, attempts to achieve efficient early detection through a Multilayer …

Context-based co-presence detection techniques: A survey

M Conti, C Lal - Computers & Security, 2020 - Elsevier
In this paper, we present a systematic survey on the contextual information based proximity
detection techniques. These techniques are heavily used for improving security and usability …

Non-invasive challenge response authentication for voice transactions with smart home behavior

V Hayashi, W Ruggiero - Sensors, 2020 - mdpi.com
Smart speakers, such as Alexa and Google Home, support daily activities in smart home
environments. Even though voice commands enable friction-less interactions, existing …

You foot the bill! Attacking NFC with passive relays

Y Sun, S Kumar, S He, J Chen… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Imagine when you line up in a store, the person in front of you can make you pay her bill by
using a passive wearable device that forces a scan of your credit card or mobile phones …

Notice of Retraction: Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags

C Bermejo, H Flores, P Hui - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Steal Your Life Using 5 Cents: Hacking Android Smartphones with NFC Tags Page 1 Document
Retracted from IEEE Xplore® After careful and considered review of the content of this paper by …

Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study

K Markantonakis, JA Meister, I Gurulian… - IEEE …, 2024 - ieeexplore.ieee.org
Near-Field Communication (NFC) has enabled mobile devices to emulate contactless smart
cards, which has also rendered them susceptible to relay attacks. Numerous …

[PDF][PDF] A side-channel analysis of sensor multiplexing for covert channels and application fingerprinting on mobile devices

C Shepherd, J Kalbantner, B Semal… - arXiv preprint arXiv …, 2021 - researchgate.net
Mobile devices often distribute measurements from a single physical sensor to multiple
applications using software-based multiplexing. On Android devices, the highest requested …

Cyber-physical intrusion detection for robotic vehicles

TP Vuong - 2017 - gala.gre.ac.uk
Intrusion detection systems (IDS) designed for conventional computer systems and networks
are not necessarily suitable for mobile cyber-physical systems (CPS), such as robots, drones …