2017 9th International Conference on Electronics, Computers and Artificial Intelligence (ECAI) 2017
DOI: 10.1109/ecai.2017.8166453
|View full text |Cite
|
Sign up to set email alerts
|

A smart-phone based privacy-preserving security framework for IoT devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 2 publications
0
10
0
Order By: Relevance
“…Sensors integrated in smartphone have advanced capabilities such as measuring proximity, acceleration and location or record audio/noise, sense electromagnetism or capture images and videos [29]. IoT devices lack According to [5], the smart phone can be employed as authentication factor and it facilitates the authentication of each device based on QR-based authentication framework in a user friendly manner. In the FlexRFID middleware IoT architecture, smartphone could be used as an automatic identification and sensing device at the level of the sensing/auto-tracking layer and as a backend device at the level of the application layer, where various users accessing different applications could get the required services [86].…”
Section: B Rq2 How Mobile Computing Provides Security Options To Enmentioning
confidence: 99%
See 2 more Smart Citations
“…Sensors integrated in smartphone have advanced capabilities such as measuring proximity, acceleration and location or record audio/noise, sense electromagnetism or capture images and videos [29]. IoT devices lack According to [5], the smart phone can be employed as authentication factor and it facilitates the authentication of each device based on QR-based authentication framework in a user friendly manner. In the FlexRFID middleware IoT architecture, smartphone could be used as an automatic identification and sensing device at the level of the sensing/auto-tracking layer and as a backend device at the level of the application layer, where various users accessing different applications could get the required services [86].…”
Section: B Rq2 How Mobile Computing Provides Security Options To Enmentioning
confidence: 99%
“…IoT devices are vulnerable to physical attacks due to large deployment. The significance application of smart phone is in IoT environment where all devices are fully connected via device controller, called smartphone [4] .The mobile phone act as smart controller can be used as a security control element for smarthome modules, because it can communicate with both the cloud component and the embedded devices, being able to run an IoT network protocol stack [5]. The security of mobile phone is important one due to many perspectives as it connects IoT devices and it provides a platform that enables to manage the IoT device.…”
Section: Figure 11 Accuracy Of Malware Detection Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…The QRC is a very effective technology for many IoT applications in terms of safety and authenticity e.g., these reviewed in [25][26][27][28]. Thus, in [21] a QRC technology has been used in order to perform an authentication procedure for users engaged with an cloud computing environment.…”
Section: Introductionmentioning
confidence: 99%
“…These security solutions are required to build over a secure communication channel on the internet and should be able to overcome the concerns like authentication, availability and usability. Most of the IoT devices follow design patterns of cloud computing, such as, smart-home, where devices at every end are connected to cloud component via a local gateway [2]. Users can communicate and use IoT devices via this cloud component.…”
Section: Introductionmentioning
confidence: 99%