Learn More
The Internet of Things (IoT) is a network of objects; it is enabled by the Internet technologies. The IoT always collects sensitive data, but inadequate protection may lead to serious user privacy leakage. Thus, privacy protection functions are important to the IoT. Our research aims to provide better privacy protections to IoTs. Firstly, user controlled(More)
Body sensor networks enable many interesting applications. In these applications, sensor networks always collect sensitive information, thus security is significant. Since most security mechanisms are based on identities and keys, we propose a human controlled LED-camera channel based hash key before knowledge identity and key distribution protocol. The(More)
New families of protocol, based on communication over human-based side channels , permit secure pairing or group formation in ways such that no party has to prove its name. Rather, individuals are able to hook up devices in their possession to others that they can identify by context. We examine a model in which, to prove his or her identity to a party, the(More)
A new family of protocols, based on communication over human-based side channels, permit secure pairing or group formation in ways that no party has to prove its name. These protocols are particularly suitable for authentication on mobile phones where PKI or trusted third party solutions are not practical to cover all scenarios. Rather, individuals are able(More)
In recent years, energy harvesting technologies, which can scavenge many kinds of energies from our living environment to power micro/nanodevices, have attracted increasing attention. However, remote energy transmission, flexibility and electric waveform controllability remain the key challenges for wireless power supply by an energy harvester. In this(More)
In mobile computing applications the traditional name-based concept of identity is both difficult to support and frequently inappropriate. The natural alternative is to use the context in which parties sit to identify them. We discuss this issue and the ways in which Human Interactive Security Protocols (HISPs) can play a role in enabling this.