SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity

  title={SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity},
  author={Chaohao Li and Xiaoyu Ji and Bin Wang and Kai Wang and Wenyuan Xu},
  journal={ACM Trans. Sens. Networks},
ing with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from © 2021 Association for Computing Machinery. 1550-4859/2021/05-ART19 $15.00 ACM Transactions on Sensor Networks, Vol. 17, No. 2, Article 19. Publication date: May 2021. 
1 Citations

Delivery of User Intentionality between Computer and Wearable for Proximity-based Bilateral Authentication

Experimental results show that the proposed method results in more accurate data consistency than conventional methods for user authentication intent delivery and reduces authentication failure rate by 66.7% compared to conventional ones.



Ensemble: cooperative proximity-based authentication

The experiments show that an Ensemble-enabled collection of Nokia N800 Internet Tablets can detect devices in close proximity and can reliably detect attackers as close as two meters away.

ProxiMate: proximity-based secure pairing using ambient wireless signals

ProxiMate, a system that allows wireless devices in proximity to securely pair with one another autonomously by generating a common cryptographic key directly from their shared time-varying wireless environment, is presented.

Using proximity and quantized RSS for sensor localization in wireless networks

The Cramér-Rao bound (CRB) is used to compare the minimal attainable variances of unbiased sensor location estimators for the cases of RSS and proximity measurements and results are presented which show how many bits of quantization are necessary for a QRSS-based system to nearly achieve the bounds of an unquantized RSS system.

Context-Aware User Authentication - Supporting Proximity-Based Login in Pervasive Computing

A context-aware user authentication protocol, which uses a JavaCard for identification and cryptographic calculations, uses a context-awareness system for verifying the user’s location, and implements a security fall-back strategy.

Do You Feel What I Hear? Enabling Autonomous IoT Device Pairing Using Different Sensor Types

A new context-based pairing mechanism called Perceptio that uses time as the common factor across differing sensor types and demonstrates the ability to sufficiently distinguish between legitimate devices placed within the boundary and attacker devices (placed outside) by imposing a threshold on fingerprint similarity.

WiGest: A ubiquitous WiFi-based gesture recognition system

This work presents WiGest: a system that leverages changes in WiFi signal strength to sense in-air hand gestures around the user's mobile device, using standard WiFi equipment, with no modifications, and no training for gesture recognition.

Sensetribute: smart home occupant identification via fusion across on-object sensing devices

SenseTribute is proposed, a novel occupant identification solution that makes use of existing and prevalent on-object sensors that are originally designed to monitor the status of objects they are attached to that operates over a sequence of events within a user activity.

HlcAuth: Key-free and Secure Communications via Home-Limited Channel

The HlcAuth protocol is designed, which can defeat replay attacks, message-forgery attacks, and man-in-the-middle (MiTM) attacks, among others, and is low cost, lightweight as well as key-free, and requiring no human intervention.

Secure Communication Based on Ambient Audio

This paper experimentally verified the feasibility of the proposed fuzzy-cryptography protocol in four different realistic settings and a laboratory experiment and applies statistical tests to show that the entropy of fingerprints based on ambient audio is high.