A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Key Generation for Internet of Things: A Contemporary Survey
[article]
2020
arXiv
pre-print
In the past few years, a variety of key generation protocols and systems have been proposed. In this survey, we review and categorise recent key generation systems based on a novel taxonomy. ...
Key generation is a promising technique to bootstrap secure communications for the Internet of Things (IoT) devices that have no prior knowledge between each other. ...
These devices are often called wearables for short and examples of such devices include smart glass, smart watch, and smart clothing. ...
arXiv:2007.15956v2
fatcat:5uzp4sa6xfdkzpmqx3hzngpdce
Security Properties of Gait for Mobile Device Pairing
2019
IEEE Transactions on Mobile Computing
statistical properties of generated sequences, an entropy analysis, as well as possible threats and security weaknesses of gait-based pairing systems. ...
As a general limitation of gait-based authentication or pairing systems, we further demonstrate that an adversary with video support can create key sequences that are sufficiently close to on-body generated ...
ACKNOWLEDGMENT We appreciate partial funding in the frame of an EIT Digital HII Active project, as well as from the Academy of Finland and from the German Academic Exchange Service (DAAD). ...
doi:10.1109/tmc.2019.2897933
fatcat:d7ny77nwefelvhxpwyiecc7xiq
A Survey on Metaverse: Fundamentals, Security, and Privacy
[article]
2022
arXiv
pre-print
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize ...
Specifically, we first investigate a novel distributed metaverse architecture and its key characteristics with ternary-world interactions. ...
U20A20175, U1808207), and the Fundamental Research Funds for the Central Universities. ...
arXiv:2203.02662v3
fatcat:iudwizbvp5cv3fga6lpvydlrna
Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review
2020
Sensors
Secondly, we summarize the privacy-preserving methods employed to protect the security of sensor-based data used to conduct user authentication, and some practical examples of their utilization. ...
The analysis of the literature of these topics reveals the importance of sensor-based data to protect personal and professional information, as well as the need for exploring a combination of more biometric ...
The most important schemes of key binding biometric cryptosystems are Fuzzy Commitment [91] and Fuzzy Vault [92] ; -Key generation: In this case, the biometric key is generated from the helper data ...
doi:10.3390/s21010092
pmid:33375710
fatcat:vv53avi5zzhojnvq4chcpnmfmy
Wireless Body Area Networks: Challenges, Trends and Emerging Technologies
2013
Proceedings of the 8th International Conference on Body Area Networks
We provide a comprehensive review of the challenges and emerging technologies for WBANs: Wireless Body Area Networks. ...
A succinct review of solutions, progress and possible future research in the areas of sensors, power and radio hardware components, the network stack, localization and mobility techniques, security and ...
[16] ), but also communication security issues fostering novel ideas for cryptographic key generation and distribution, such as fuzzy vault cryptographic primitives used in conjunction with various parameters ...
doi:10.4108/icst.bodynets.2013.253722
dblp:conf/bodynets/AntonescuB13
fatcat:kuvlchu4pfbadjwrsjn3nb6qq4
A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems
[article]
2019
arXiv
pre-print
Biometric research is directed increasingly towards Wearable Biometric Systems (WBS) for user authentication and identification. ...
vulnerabilities, attacks and defenses for TBS and WBS. ...
Since randomness in modality features is hard to achieve for cryptosystems, fuzzy-based extractors using shielding functions, fuzzy commitment, and fuzzy vault schemes were proposed and applied to the ...
arXiv:1903.02548v1
fatcat:mkl32giawnb5lgornzq4w3ec74
LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks
2017
Security and Communication Networks
So, in this paper, we proposed a lightweight and efficient public auditing scheme, LEPA, for cloud-assisted WBSNs. ...
Considering the huge processing and storage capacity of the cloud, it can be merged with WBSNs to make up for the deficiencies of weak capacity. ...
), the Natural Science Foundation of Anhui Province (no. 1508085QF132), and the Doctoral Research Start-Up Funds Project of Anhui University. ...
doi:10.1155/2017/4364376
fatcat:kysg5ebo4zg7phuhn4oytn5x34
Mobile Health Technologies for Diabetes Mellitus: Current State and Future Challenges
2019
IEEE Access
Existing review articles have evaluated the MH literature based on applicability and level of adoption by patients and healthcare providers. ...
Mobile health (MH) is an information and communications technology trend to empower chronically ill patients in a smart environment. ...
There are many underlying communications protocols, data formats, and technologies for sensor data (e.g., accelerometers, gyroscopes, altimeters) [67] . ...
doi:10.1109/access.2018.2881001
fatcat:ha4lscdyxfbi7jed5w2blan5yu
Some aspects of physical prototyping in Pervasive Computing
[article]
2018
arXiv
pre-print
Another use of physical layer RF-signals is for security applications. We are currently working to further push these mentioned directions and novel fields of physical prototyping. ...
In particular, the calculation of mathematical operations on the wireless channel at the time of transmission appears to contain good potential for gains in efficiency for communication and computation ...
The authors establish a key distribution based on a fuzzy vault [184] using data measured by devices worn on the human body. ...
arXiv:1801.06326v1
fatcat:yhieujb32vc4jdcasbotbgkod4
Intelligent Computing Research Studies in Life Science
2019
International Journal of Pharma and Bio Sciences
A new protocol for distributing the key has been introduced by Vijayakumar etal. ...
Qinlong etal presented a paper that uses broadcast encryption technique that are identity based, the encrypted health data of patients are outsourced on the cloud and are shared among the group of doctors ...
Comparison graph for key generation time in seconds ECC offers extensive data transmission over RSA and with respect to same dimension of security RSA requires a bigger key size than ECC.
F. ...
doi:10.22376/ijpbs/10.sp01/oct/2019.1-142
fatcat:6fc5ghwmjbgrphetiablavajxm
ANCRiSST 2019 Procedia: 14th International Workshop on Advanced Smart Materials and Smart Structures Technology
[article]
2019
Zenodo
ANCRiSST 2019 is organised by the Asian-Pacific Network of Centers for Research in Smart Structures Technology (ANCRiSST), European Association for Structural Dynamics (EASD) and Sapienza University of ...
ANCRiSST 2019 is the Fourteenth International Workshop on Advanced Smart Materials and Smart Structures Technology. ...
the Spanish Ministry of Science and Innovation for the pre-doctoral scholarship granted to Ana Martínez Ibernón (FPU 13/00723). ...
doi:10.5281/zenodo.7114103
fatcat:x25ln4fusbgpngxdnl5nci6sei
Advanced Applications of Industrial Robotics: New Trends and Possibilities
2021
Applied Sciences
; and psychological solutions for robot–human collaboration. ...
The results of this review revealed four directions of required advancement in robotics: development of intelligent companions; improved implementation of AI-based solutions; robot-oriented design of objects ...
Unobtrusive audiovisual sensors and wearable sensors, providing the child's heart-rate, skin-conductance (EDA), body temperature, and accelerometer data. Feed-forward multilayer neural networks. ...
doi:10.3390/app12010135
fatcat:o4ohtgzqnvfnfjqcc34p65yvpm
Securing body sensor networks and pervasive healthcare systems
2020
With increasing popularity of wearable and Body Sensor Network (BSN) technologies, there is a growing concern on the security and data protection of such low-power ubiquitous devices. ...
for securing BSNs. ...
Based on the same principle, Revadigar, Javali, Xu, Vasilakos, et al. (2017) proposed a fuzzy vault-based group key generation protocol. ...
doi:10.25560/80236
fatcat:2dqtj5nvwfhuveokaacmt7xx7y
Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks
2023
Our aim is to suggest future research directions for establishing best practices in protecting healthcare data. This includes monitoring, access control, key management, and trust management. ...
The aim is to present an overall review of WBAN research and projects based on applications, devices, and communication architecture. ...
A distributed group key agreement protocol has been proposed to secure communication in BANs. ...
doi:10.3390/s23249856
pmid:38139702
pmcid:PMC10747010
fatcat:qvtrxkhndbec7n72ofm2fbnugq
GI-Dagstuhl Seminar 16353 on Aware Machine to Machine Communication
2017
unpublished
It brought together people who are actively involved in the ICN community and also researchers with background on (usable) security, smart environments. ...
The Karuizawa meeting focused on information-sharing in IoT, Crowd sensing and crowd steering, in-network data reduction, and Self-organizing data-collection networks. ...
The organizers would like to thank the participants for their contributions. Special thanks to Olga Streibel for her help during the reviewing of the manuscript. ...
fatcat:v4kcxmqhxba6vgtiwf6ho2nuvy
« Previous
Showing results 1 — 15 out of 19 results