Perils of Zero-Interaction Security in the Internet of Things

@article{Fomichev2019PerilsOZ,
  title={Perils of Zero-Interaction Security in the Internet of Things},
  author={M. Fomichev and Max Maass and Lars Almon and Alejandro Molina and M. Hollick},
  journal={Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies},
  year={2019},
  volume={3},
  pages={1 - 38}
}
  • M. Fomichev, Max Maass, +2 authors M. Hollick
  • Published 2019
  • Computer Science
  • Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
  • The Internet of Things (IoT) demands authentication systems which can provide both security and usability. Recent research utilizes the rich sensing capabilities of smart devices to build security schemes operating without human interaction, such as zero-interaction pairing (ZIP) and zero-interaction authentication (ZIA). Prior work proposed a number of ZIP and ZIA schemes and reported promising results. However, those schemes were often evaluated under conditions which do not reflect realistic… CONTINUE READING
    8 Citations
    ZERO-INTERACTION SECURITY-TOWARDS SOUND EXPERIMENTAL VALIDATION
    • PDF
    Context-based Co-presence detection techniques: A survey
    • 1
    • PDF
    Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges
    • 3
    • Highly Influenced
    • PDF
    SAFER: Development and Evaluation of an IoT Device Risk Assessment Framework in a Multinational Organization
    • PDF
    Acoustic integrity codes: secure device pairing using short-range acoustic communication
    • PDF
    Characterizing and Detecting Online Deception via Data-Driven Methods
    • PDF

    References

    SHOWING 1-6 OF 6 REFERENCES
    Comparing and fusing different sensor modalities for relay attack resistance in Zero-Interaction Authentication
    • 61
    • Highly Influential
    • PDF
    Context-Based Zero-Interaction Pairing and Key Evolution for Advanced Personal Devices
    • 90
    • Highly Influential
    • PDF
    Instant and Robust Authentication and Key Agreement among Mobile Devices
    • 42
    • Highly Influential
    • PDF
    Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing
    • 68
    • Highly Influential
    • PDF
    Secure Communication Based on Ambient Audio
    • 125
    • Highly Influential
    • PDF
    Sound-Proof: Usable Two-Factor Authentication Based on Ambient Sound
    • 129
    • Highly Influential
    • PDF