Abstract
Reproducibility and realistic datasets are crucial for advancing research. Unfortunately, they are often neglected as valid scientific contributions in many young disciplines, with computer science being no exception. In this article, we show the challenges encountered when reproducing the work of others, collecting realistic data in the wild, and ensuring that our own work is reproducible in turn. The presented findings are based on our study investigating the limits of zero-interaction security (ZIS)- a novel concept, leveraging sensor data collected by Internet of Things (IoT) devices to pair or authenticate devices. In particular, we share our experiences in reproducing five state-of-the-art ZIS schemes, collecting a comprehensive dataset of sensor data from the real world, evaluating these schemes on the collected data, and releasing the data, code, and documentation to facilitate reproducibility of our results.
- Fomichev, M., Maass, M., Almon, L., Molina, A. and Hollick, M. (2019). Perils of zero-interaction security in the Internet of Things. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 3(1). DOI:https://doi. org/10.1145/3314397.Google Scholar
Digital Library
- Fomichev, M., Maass, M., Almon, L., Molina, A. and Hollick, M. (2019). A dataset for zerointeraction security systems. DOI: https://doi. org/10.5281/zenodo.2537721Google Scholar
- Benureau, F.C.Y. and Rougier, N.P. (2018, January). Re-run, repeat, reproduce, reuse, replicate: Transforming code into scientific contributions. Frontiers in Neuroinformatics, 11, 1--8. DOI:https://doi.org/10.3389/ fninf.2017.00069.Google Scholar
Cross Ref
- Collberg, C. and Proebsting, T.A. (2016, February). Repeatability in computer systems research. Communications of the ACM, 59(3) 62--69. DOI:https://doi.org/10.1145/2812803.Google Scholar
Digital Library
- Rawassizadeh, R. and Kotz, D. (2017, April). Datasets for mobile, wearable and IoT research. GetMobile: Mobile Computing and Communications, 20(4), 5--7. DOI:https://doi. org/10.1145/3081016.3081018.Google Scholar
Digital Library
- Md Faridee, A.Z., Ramamurthy, S.R. and Roy, N. (2018, September). HappyFeet: Challenges in building an automated dance recognition and assessment tool. GetMobile: Mobile Computing and Communications, 22(3), 10--16. DOI:https:// doi.org/10.1145/3308755.3308759Google Scholar
Digital Library
- Stisen, A., Blunck, H., Bhattacharya, S., Prentow, T.S., Kjærgaard, M.B., Dey, A., Sonne, T. and Jensen, M.M. (2015). Smart Devices are Different: Assessing and Mitigating Mobile Sensing Heterogeneities for Activity Recognition. ACM SenSys., 127--140. DOI:https://doi. org/10.1145/2809695.2809718Google Scholar
Recommendations
Perils of Zero-Interaction Security in the Internet of Things
The Internet of Things (IoT) demands authentication systems which can provide both security and usability. Recent research utilizes the rich sensing capabilities of smart devices to build security schemes operating without human interaction, such as zero-...
Towards key-dependent message security in the standard model
EUROCRYPT'08: Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptologyStandard security notions for encryption schemes do not guarantee any security if the encrypted messages depend on the secret key. Yet it is exactly the stronger notion of security in the presence of key-dependent messages (KDM security) that is ...
Comments