Physical Side-Channel Attacks against Intermittent Devices

MO Ozmen, H Farrukh, ZB Celik - Proceedings on Privacy …, 2024 - petsymposium.org
Intermittent (batteryless) devices operate solely using energy harvested from their
environment. These devices turn on when they have energy and turn off during energy …

Touchkey: Touch to generate symmetric keys by skin electric potentials induced by powerline radiation

Y Miao, C Gu, Z Yan, SY Chau, R Tan, Q Lin… - Proceedings of the …, 2023 - dl.acm.org
Secure device pairing is important to wearables. Existing solutions either degrade usability
due to the need of specific actions like shaking, or they lack universality due to the need of …

[PDF][PDF] From Virtual Touch to Tesla Command: Unlocking Unauthenticated Control Chains From Smart Glasses for Vehicle Takeover

X Zhang, Y Tu, Y Long, L Shan, MA Elsaadani… - 2024 IEEE Symposium …, 2024 - xialihei.com
This paper studies vulnerabilities at the intersection of wearable devices and automated
control systems. Particularly, we focus on exploiting smart glasses as an entry point and …

A secure federated learning approach to smart microgrid stability prediction

A Reza, A Bose, L Bai - 2023 32nd International Conference on …, 2023 - ieeexplore.ieee.org
This paper addresses the challenges posed by the proliferation of Internet-of-Things (IoT)
based smart grids in modern power systems, which can threaten the stability and security of …

An anonymous and efficient certificateless signature scheme based on blockchain in NDN‐IoT environments

C Wang, X Deng, M Ma, Q Li, H Bai… - Transactions on …, 2024 - Wiley Online Library
Abstract The Named Data Networking (NDN) architecture, known for its caching strategies
and name‐based routing, is an exemplary paradigm for content distribution across Internet …

InaudibleKey2. 0: Deep Learning-Empowered Mobile Device Pairing Protocol Based on Inaudible Acoustic Signals

H Yang, Z Li, C Luo, B Wei, W Xu - IEEE/ACM Transactions on …, 2024 - ieeexplore.ieee.org
The increasing proliferation of Internet-of-Things (IoT) devices in daily life has rendered
secure Device-to-Device (D2D) communication increasingly crucial. Achieving secure D2D …

TurboBlom: A light and resilient key predistribution scheme with application to Internet of Things

M Khabbazian, R Safavi-Naini, A Shabani-Baghani - Plos one, 2024 - journals.plos.org
In the Internet of Things (IoT), there are often devices that are computationally too
constrained to establish a security key using traditional key distribution mechanisms such as …

Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events

C Fu, X Du, Q Zeng, Z Zhao, F Zuo, J Di - Proceedings of the 17th ACM …, 2024 - dl.acm.org
Along with the increasing popularity of smart home IoT devices, more users are turning to
smart home automation platforms to control and automate their IoT devices. However, IoT …

Secret-Free Device Pairing in the mmWave Band

Z Xu, J Li, Y Pan, M Li, L Lazos - arXiv preprint arXiv:2306.17330, 2023 - arxiv.org
Many Next Generation (NextG) applications feature devices that are capable of
communicating and sensing in the Millimeter-Wave (mmWave) bands. Trust establishment is …

Enhancing Physical-Layer Key Generation Accuracy through Deep Learning-Based Hardware Calibration

Y Zheng, X Wang, F Dang, X Miao - … of the 2024 Workshop on Adaptive …, 2024 - dl.acm.org
This paper introduces a deep learning-based approach for calibrating hardware defects in
physical-layer key generation (PKG) tasks, focusing on directional-of-arrival (DoA) based …