Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








19 Hits in 5.4 sec

Key Generation for Internet of Things: A Contemporary Survey [article]

Weitao Xu, Junqing Zhang, Shunqi Huang, Chengwen Luo, Wei Li
2020 arXiv   pre-print
In the past few years, a variety of key generation protocols and systems have been proposed. In this survey, we review and categorise recent key generation systems based on a novel taxonomy.  ...  Key generation is a promising technique to bootstrap secure communications for the Internet of Things (IoT) devices that have no prior knowledge between each other.  ...  These devices are often called wearables for short and examples of such devices include smart glass, smart watch, and smart clothing.  ... 
arXiv:2007.15956v2 fatcat:5uzp4sa6xfdkzpmqx3hzngpdce

Security Properties of Gait for Mobile Device Pairing

Arne Bruesch, Le Nguyen, Dominik Schurmann, Stephan Sigg, Lars C. Wolf
2019 IEEE Transactions on Mobile Computing  
statistical properties of generated sequences, an entropy analysis, as well as possible threats and security weaknesses of gait-based pairing systems.  ...  As a general limitation of gait-based authentication or pairing systems, we further demonstrate that an adversary with video support can create key sequences that are sufficiently close to on-body generated  ...  ACKNOWLEDGMENT We appreciate partial funding in the frame of an EIT Digital HII Active project, as well as from the Academy of Finland and from the German Academic Exchange Service (DAAD).  ... 
doi:10.1109/tmc.2019.2897933 fatcat:d7ny77nwefelvhxpwyiecc7xiq

A Survey on Metaverse: Fundamentals, Security, and Privacy [article]

Yuntao Wang, Zhou Su, Ning Zhang, Rui Xing, Dongxiao Liu, Tom H. Luan, Xuemin Shen
2022 arXiv   pre-print
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize  ...  Specifically, we first investigate a novel distributed metaverse architecture and its key characteristics with ternary-world interactions.  ...  U20A20175, U1808207), and the Fundamental Research Funds for the Central Universities.  ... 
arXiv:2203.02662v3 fatcat:iudwizbvp5cv3fga6lpvydlrna

Privacy-Preserving Sensor-Based Continuous Authentication and User Profiling: A Review

Luis Hernández-Álvarez, José María de Fuentes, Lorena González-Manzano, Luis Hernández Encinas
2020 Sensors  
Secondly, we summarize the privacy-preserving methods employed to protect the security of sensor-based data used to conduct user authentication, and some practical examples of their utilization.  ...  The analysis of the literature of these topics reveals the importance of sensor-based data to protect personal and professional information, as well as the need for exploring a combination of more biometric  ...  The most important schemes of key binding biometric cryptosystems are Fuzzy Commitment [91] and Fuzzy Vault [92] ; -Key generation: In this case, the biometric key is generated from the helper data  ... 
doi:10.3390/s21010092 pmid:33375710 fatcat:vv53avi5zzhojnvq4chcpnmfmy

Wireless Body Area Networks: Challenges, Trends and Emerging Technologies

Bogdan Antonescu, Stefano Basagni
2013 Proceedings of the 8th International Conference on Body Area Networks  
We provide a comprehensive review of the challenges and emerging technologies for WBANs: Wireless Body Area Networks.  ...  A succinct review of solutions, progress and possible future research in the areas of sensors, power and radio hardware components, the network stack, localization and mobility techniques, security and  ...  [16] ), but also communication security issues fostering novel ideas for cryptographic key generation and distribution, such as fuzzy vault cryptographic primitives used in conjunction with various parameters  ... 
doi:10.4108/icst.bodynets.2013.253722 dblp:conf/bodynets/AntonescuB13 fatcat:kuvlchu4pfbadjwrsjn3nb6qq4

A Survey on Modality Characteristics, Performance Evaluation Metrics, and Security for Traditional and Wearable Biometric Systems [article]

Aditya Sundararajan, Arif I. Sarwat, Alexander Pons
2019 arXiv   pre-print
Biometric research is directed increasingly towards Wearable Biometric Systems (WBS) for user authentication and identification.  ...  vulnerabilities, attacks and defenses for TBS and WBS.  ...  Since randomness in modality features is hard to achieve for cryptosystems, fuzzy-based extractors using shielding functions, fuzzy commitment, and fuzzy vault schemes were proposed and applied to the  ... 
arXiv:1903.02548v1 fatcat:mkl32giawnb5lgornzq4w3ec74

LEPA: A Lightweight and Efficient Public Auditing Scheme for Cloud-Assisted Wireless Body Sensor Networks

Song Li, Jie Cui, Hong Zhong, Yiwen Zhang, Qiang He
2017 Security and Communication Networks  
So, in this paper, we proposed a lightweight and efficient public auditing scheme, LEPA, for cloud-assisted WBSNs.  ...  Considering the huge processing and storage capacity of the cloud, it can be merged with WBSNs to make up for the deficiencies of weak capacity.  ...  ), the Natural Science Foundation of Anhui Province (no. 1508085QF132), and the Doctoral Research Start-Up Funds Project of Anhui University.  ... 
doi:10.1155/2017/4364376 fatcat:kysg5ebo4zg7phuhn4oytn5x34

Mobile Health Technologies for Diabetes Mellitus: Current State and Future Challenges

Shaker El-Sappagh, Farman Ali, Samir El-Masri, Kyehyun Kim, Amjad Ali, Kyung-Sup Kwak
2019 IEEE Access  
Existing review articles have evaluated the MH literature based on applicability and level of adoption by patients and healthcare providers.  ...  Mobile health (MH) is an information and communications technology trend to empower chronically ill patients in a smart environment.  ...  There are many underlying communications protocols, data formats, and technologies for sensor data (e.g., accelerometers, gyroscopes, altimeters) [67] .  ... 
doi:10.1109/access.2018.2881001 fatcat:ha4lscdyxfbi7jed5w2blan5yu

Some aspects of physical prototyping in Pervasive Computing [article]

Stephan Sigg
2018 arXiv   pre-print
Another use of physical layer RF-signals is for security applications. We are currently working to further push these mentioned directions and novel fields of physical prototyping.  ...  In particular, the calculation of mathematical operations on the wireless channel at the time of transmission appears to contain good potential for gains in efficiency for communication and computation  ...  The authors establish a key distribution based on a fuzzy vault [184] using data measured by devices worn on the human body.  ... 
arXiv:1801.06326v1 fatcat:yhieujb32vc4jdcasbotbgkod4

Intelligent Computing Research Studies in Life Science

Dr. Thilagamani S
2019 International Journal of Pharma and Bio Sciences  
A new protocol for distributing the key has been introduced by Vijayakumar etal.  ...  Qinlong etal presented a paper that uses broadcast encryption technique that are identity based, the encrypted health data of patients are outsourced on the cloud and are shared among the group of doctors  ...  Comparison graph for key generation time in seconds ECC offers extensive data transmission over RSA and with respect to same dimension of security RSA requires a bigger key size than ECC. F.  ... 
doi:10.22376/ijpbs/10.sp01/oct/2019.1-142 fatcat:6fc5ghwmjbgrphetiablavajxm

ANCRiSST 2019 Procedia: 14th International Workshop on Advanced Smart Materials and Smart Structures Technology [article]

V. Gattulli, O. Bursi, D. Zonta
2019 Zenodo  
ANCRiSST 2019 is organised by the Asian-Pacific Network of Centers for Research in Smart Structures Technology (ANCRiSST), European Association for Structural Dynamics (EASD) and Sapienza University of  ...  ANCRiSST 2019 is the Fourteenth International Workshop on Advanced Smart Materials and Smart Structures Technology.  ...  the Spanish Ministry of Science and Innovation for the pre-doctoral scholarship granted to Ana Martínez Ibernón (FPU 13/00723).  ... 
doi:10.5281/zenodo.7114103 fatcat:x25ln4fusbgpngxdnl5nci6sei

Advanced Applications of Industrial Robotics: New Trends and Possibilities

Andrius Dzedzickis, Jurga Subačiūtė-Žemaitienė, Ernestas Šutinys, Urtė Samukaitė-Bubnienė, Vytautas Bučinskas
2021 Applied Sciences  
; and psychological solutions for robot–human collaboration.  ...  The results of this review revealed four directions of required advancement in robotics: development of intelligent companions; improved implementation of AI-based solutions; robot-oriented design of objects  ...  Unobtrusive audiovisual sensors and wearable sensors, providing the child's heart-rate, skin-conductance (EDA), body temperature, and accelerometer data. Feed-forward multilayer neural networks.  ... 
doi:10.3390/app12010135 fatcat:o4ohtgzqnvfnfjqcc34p65yvpm

Securing body sensor networks and pervasive healthcare systems

Yingnan Sun, Benny Lo, Guang-Zhong Yang
2020
With increasing popularity of wearable and Body Sensor Network (BSN) technologies, there is a growing concern on the security and data protection of such low-power ubiquitous devices.  ...  for securing BSNs.  ...  Based on the same principle, Revadigar, Javali, Xu, Vasilakos, et al. (2017) proposed a fuzzy vault-based group key generation protocol.  ... 
doi:10.25560/80236 fatcat:2dqtj5nvwfhuveokaacmt7xx7y

Access Control, Key Management, and Trust for Emerging Wireless Body Area Networks

Ahmad Salehi Shahraki, Hagen Lauer, Marthie Grobler, Amin Sakzad, Carsten Rudolph
2023
Our aim is to suggest future research directions for establishing best practices in protecting healthcare data. This includes monitoring, access control, key management, and trust management.  ...  The aim is to present an overall review of WBAN research and projects based on applications, devices, and communication architecture.  ...  A distributed group key agreement protocol has been proposed to secure communication in BANs.  ... 
doi:10.3390/s23249856 pmid:38139702 pmcid:PMC10747010 fatcat:qvtrxkhndbec7n72ofm2fbnugq

GI-Dagstuhl Seminar 16353 on Aware Machine to Machine Communication

Mayutan Arumaithurai, Stephan Sigg, Xiaoyan Wang
2017 unpublished
It brought together people who are actively involved in the ICN community and also researchers with background on (usable) security, smart environments.  ...  The Karuizawa meeting focused on information-sharing in IoT, Crowd sensing and crowd steering, in-network data reduction, and Self-organizing data-collection networks.  ...  The organizers would like to thank the participants for their contributions. Special thanks to Olga Streibel for her help during the reviewing of the manuscript.  ... 
fatcat:v4kcxmqhxba6vgtiwf6ho2nuvy
« Previous Showing results 1 — 15 out of 19 results