2020
DOI: 10.48550/arxiv.2010.10334
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

DLWIoT: Deep Learning-based Watermarking for Authorized IoT Onboarding

Abstract: The onboarding of IoT devices by authorized users constitutes both a challenge and a necessity in a world, where the number of IoT devices and the tampering attacks against them continuously increase. Commonly used onboarding techniques today include the use of QR codes, pin codes, or serial numbers. These techniques typically do not protect against unauthorized device access-a QR code is physically printed on the device, while a pin code may be included in the device packaging. As a result, any entity that ha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…IoT is considered to be the future of the Internet, where things communicate with/over the Internet using any network, any service, from any place. Most IoT sensors have limitations in computation and memory [89,118].…”
Section: Resource-constrained Devicesmentioning
confidence: 99%
“…IoT is considered to be the future of the Internet, where things communicate with/over the Internet using any network, any service, from any place. Most IoT sensors have limitations in computation and memory [89,118].…”
Section: Resource-constrained Devicesmentioning
confidence: 99%
“…Edge computing solutions open opportunities for future computer networking research. Such opportunities include mechanisms for the allocation and discovery of computing resources at the edge [36], [37], as well as the dynamic offloading of computational tasks at the edge [38]. For example, if multiple edge servers are available, we may need consecutive computational tasks to be offloaded to the same edge server.…”
Section: Cloud and Edge Computing Technologiesmentioning
confidence: 99%