Perils of Zero-Interaction Security in the Internet of Things
@article{Fomichev2019PerilsOZ, title={Perils of Zero-Interaction Security in the Internet of Things}, author={M. Fomichev and Max Maass and Lars Almon and Alejandro Molina and M. Hollick}, journal={Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies}, year={2019}, volume={3}, pages={1 - 38} }
The Internet of Things (IoT) demands authentication systems which can provide both security and usability. Recent research utilizes the rich sensing capabilities of smart devices to build security schemes operating without human interaction, such as zero-interaction pairing (ZIP) and zero-interaction authentication (ZIA). Prior work proposed a number of ZIP and ZIA schemes and reported promising results. However, those schemes were often evaluated under conditions which do not reflect realistic… CONTINUE READING
Figures, Tables, and Topics from this paper
8 Citations
ivPair: context-based fast intra-vehicle device pairing for secure wireless connectivity
- Computer Science
- WISEC
- 2020
- PDF
Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges
- Computer Science, Engineering
- IEEE Communications Surveys & Tutorials
- 2021
- 3
- Highly Influenced
- PDF
SAFER: Development and Evaluation of an IoT Device Risk Assessment Framework in a Multinational Organization
- Computer Science
- Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
- 2020
- PDF
Acoustic integrity codes: secure device pairing using short-range acoustic communication
- Computer Science, Engineering
- WISEC
- 2020
- PDF
References
SHOWING 1-6 OF 6 REFERENCES
Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication
- Computer Science
- 2014 IEEE International Conference on Pervasive Computing and Communications (PerCom)
- 2014
- 61
- Highly Influential
- PDF
Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices
- Computer Science
- CCS
- 2014
- 90
- Highly Influential
- PDF
Instant and Robust Authentication and Key Agreement among Mobile Devices
- Computer Science
- CCS
- 2016
- 42
- Highly Influential
- PDF
Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing
- Computer Science
- Financial Cryptography
- 2014
- 68
- Highly Influential
- PDF
Secure Communication Based on Ambient Audio
- Computer Science
- IEEE Transactions on Mobile Computing
- 2013
- 125
- Highly Influential
- PDF
Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound
- Computer Science
- USENIX Security Symposium
- 2015
- 129
- Highly Influential
- PDF