Physical Side-Channel Attacks against Intermittent Devices
Intermittent (batteryless) devices operate solely using energy harvested from their
environment. These devices turn on when they have energy and turn off during energy …
environment. These devices turn on when they have energy and turn off during energy …
Touchkey: Touch to generate symmetric keys by skin electric potentials induced by powerline radiation
Secure device pairing is important to wearables. Existing solutions either degrade usability
due to the need of specific actions like shaking, or they lack universality due to the need of …
due to the need of specific actions like shaking, or they lack universality due to the need of …
[PDF][PDF] From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover
This paper studies vulnerabilities at the intersection of wearable devices and automated
control systems. Particularly, we focus on exploiting smart glasses as an entry point and …
control systems. Particularly, we focus on exploiting smart glasses as an entry point and …
A secure federated learning approach to smart microgrid stability prediction
This paper addresses the challenges posed by the proliferation of Internet-of-Things (IoT)
based smart grids in modern power systems, which can threaten the stability and security of …
based smart grids in modern power systems, which can threaten the stability and security of …
An anonymous and efficient certificateless signature scheme based on blockchain in NDN‐IoT environments
Abstract The Named Data Networking (NDN) architecture, known for its caching strategies
and name‐based routing, is an exemplary paradigm for content distribution across Internet …
and name‐based routing, is an exemplary paradigm for content distribution across Internet …
InaudibleKey2. 0: Deep Learning-Empowered Mobile Device Pairing Protocol Based on Inaudible Acoustic Signals
The increasing proliferation of Internet-of-Things (IoT) devices in daily life has rendered
secure Device-to-Device (D2D) communication increasingly crucial. Achieving secure D2D …
secure Device-to-Device (D2D) communication increasingly crucial. Achieving secure D2D …
TurboBlom: A light and resilient key predistribution scheme with application to Internet of Things
M Khabbazian, R Safavi-Naini, A Shabani-Baghani - Plos one, 2024 - journals.plos.org
In the Internet of Things (IoT), there are often devices that are computationally too
constrained to establish a security key using traditional key distribution mechanisms such as …
constrained to establish a security key using traditional key distribution mechanisms such as …
Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events
Along with the increasing popularity of smart home IoT devices, more users are turning to
smart home automation platforms to control and automate their IoT devices. However, IoT …
smart home automation platforms to control and automate their IoT devices. However, IoT …
Secret-Free Device Pairing in the mmWave Band
Many Next Generation (NextG) applications feature devices that are capable of
communicating and sensing in the Millimeter-Wave (mmWave) bands. Trust establishment is …
communicating and sensing in the Millimeter-Wave (mmWave) bands. Trust establishment is …
Enhancing Physical-Layer Key Generation Accuracy through Deep Learning-Based Hardware Calibration
This paper introduces a deep learning-based approach for calibrating hardware defects in
physical-layer key generation (PKG) tasks, focusing on directional-of-arrival (DoA) based …
physical-layer key generation (PKG) tasks, focusing on directional-of-arrival (DoA) based …