172 research outputs found
Securing Cyber-Physical Social Interactions on Wrist-worn Devices
Since ancient Greece, handshaking has been commonly practiced between two people as a friendly gesture to express trust and respect, or form a mutual agreement. In this article, we show that such physical contact can be used to bootstrap secure cyber contact between the smart devices worn by users. The key observation is that during handshaking, although belonged to two different users, the two hands involved in the shaking events are often rigidly connected, and therefore exhibit very similar motion patterns. We propose a novel key generation system, which harvests motion data during user handshaking from the wrist-worn smart devices such as smartwatches or fitness bands, and exploits the matching motion patterns to generate symmetric keys on both parties. The generated keys can be then used to establish a secure communication channel for exchanging data between devices. This provides a much more natural and user-friendly alternative for many applications, e.g., exchanging/sharing contact details, friending on social networks, or even making payments, since it doesn’t involve extra bespoke hardware, nor require the users to perform pre-defined gestures. We implement the proposed key generation system on off-the-shelf smartwatches, and extensive evaluation shows that it can reliably generate 128-bit symmetric keys just after around 1s of handshaking (with success rate >99%), and is resilient to different types of attacks including impersonate mimicking attacks, impersonate passive attacks, or eavesdropping attacks. Specifically, for real-time impersonate mimicking attacks, in our experiments, the Equal Error Rate (EER) is only 1.6% on average. We also show that the proposed key generation system can be extremely lightweight and is able to run in-situ on the resource-constrained smartwatches without incurring excessive resource consumption
The survey on Near Field Communication
PubMed ID: 26057043Near Field Communication (NFC) is an emerging short-range wireless communication technology that offers great and varied promise in services such as payment, ticketing, gaming, crowd sourcing, voting, navigation, and many others. NFC technology enables the integration of services from a wide range of applications into one single smartphone. NFC technology has emerged recently, and consequently not much academic data are available yet, although the number of academic research studies carried out in the past two years has already surpassed the total number of the prior works combined. This paper presents the concept of NFC technology in a holistic approach from different perspectives, including hardware improvement and optimization, communication essentials and standards, applications, secure elements, privacy and security, usability analysis, and ecosystem and business issues. Further research opportunities in terms of the academic and business points of view are also explored and discussed at the end of each section. This comprehensive survey will be a valuable guide for researchers and academicians, as well as for business in the NFC technology and ecosystem.Publisher's Versio
Sensitive and Makeable Computational Materials for the Creation of Smart Everyday Objects
The vision of computational materials is to create smart everyday objects using the materi- als that have sensing and computational capabilities embedded into them. However, today’s development of computational materials is limited because its interfaces (i.e. sensors) are unable to support wide ranges of human interactions , and withstand the fabrication meth- ods of everyday objects (e.g. cutting and assembling). These barriers hinder citizens from creating smart every day objects using computational materials on a large scale.
To overcome the barriers, this dissertation presents the approaches to develop compu- tational materials to be 1) sensitive to a wide variety of user interactions, including explicit interactions (e.g. user inputs) and implicit interactions (e.g. user contexts), and 2) makeable against a wide range of fabrication operations, such cutting and assembling. I exemplify the approaches through five research projects on two common materials, textile and wood. For each project, I explore how a material interface can be made to sense user inputs or activities, and how it can be optimized to balance sensitivity and fabrication complexity. I discuss the sensing algorithms and machine learning model to interpret the sensor data as high-level abstraction and interaction. I show the practical applications of developed computational materials. I demonstrate the evaluation study to validate their performance and robustness.
In the end of this dissertation, I summarize the contributions of my thesis and discuss future directions for the vision of computational materials
Secure Mobile Payment Architecture Enabling Multi-factor Authentication
The rise of smartphones has led to a significant increase in the usage of
mobile payments. Mobile payments allow individuals to access financial
resources and make transactions through their mobile devices while on the go.
However, the current mobile payment systems were designed to align with
traditional payment structures, which limits the full potential of smartphones,
including their security features. This has become a major concern in the
rapidly growing mobile payment market. To address these security concerns,in
this paper we propose new mobile payment architecture. This architecture
leverages the advanced capabilities of modern smartphones to verify various
aspects of a payment, such as funds, biometrics, location, and others. The
proposed system aims to guarantee the legitimacy of transactions and protect
against identity theft by verifying multiple elements of a payment. The
security of mobile payment systems is crucial, given the rapid growth of the
market. Evaluating mobile payment systems based on their authentication,
encryption, and fraud detection capabilities is of utmost importance. The
proposed architecture provides a secure mobile payment solution that enhances
the overall payment experience by taking advantage of the advanced capabilities
of modern smartphones. This will not only improve the security of mobile
payments but also offer a more user-friendly payment experience for consumers
AmIE: An Ambient Intelligent Environment for Assisted Living
In the modern world of technology Internet-of-things (IoT) systems strives to
provide an extensive interconnected and automated solutions for almost every
life aspect. This paper proposes an IoT context-aware system to present an
Ambient Intelligence (AmI) environment; such as an apartment, house, or a
building; to assist blind, visually-impaired, and elderly people. The proposed
system aims at providing an easy-to-utilize voice-controlled system to locate,
navigate and assist users indoors. The main purpose of the system is to provide
indoor positioning, assisted navigation, outside weather information, room
temperature, people availability, phone calls and emergency evacuation when
needed. The system enhances the user's awareness of the surrounding environment
by feeding them with relevant information through a wearable device to assist
them. In addition, the system is voice-controlled in both English and Arabic
languages and the information are displayed as audio messages in both
languages. The system design, implementation, and evaluation consider the
constraints in common types of premises in Kuwait and in challenges, such as
the training needed by the users. This paper presents cost-effective
implementation options by the adoption of a Raspberry Pi microcomputer,
Bluetooth Low Energy devices and an Android smart watch.Comment: 6 pages, 8 figures, 1 tabl
Leveraging Smart Technology for User Experience Personalization – A Comparative Case Study of Innovative Payment Systems
Background: This study seeks to understand how the attributes of smart technology (SMT) can be leveraged to enable personalized services and optimize unique user experiences to attract and retain customers. Based on Kang et al.’s (2020) study of SMT attributes and quality effects and Liang et al.’s (2006) study on personalized recommendation and user satisfaction, we constructed a SMT personalization model to analyze how the SMT attributes of smart functionality and smart content enable personalization in different ways and create unique customer experiences throughout the user journey.
Method: Two representative payment systems were selected to depict how they integrated the strengths of personalized smart functionalities and contents to innovate their business models, optimize user experiences, and sustain business growth.
Results: Based on the comparative analysis of the two payment cases, the functionality and content attributes of smart chips and omni-channel platforms were explored, and the tailored advisory and responsive support for customers both offline and online were validated.
Conclusion: The life-enriching service innovations provide valuable insights for leveraging SMT for personalization. It is hoped that the SMT personalization model can be extended to other types of SMT applications and can be used as a framework for designing innovative services
Survey and Systematization of Secure Device Pairing
Secure Device Pairing (SDP) schemes have been developed to facilitate secure
communications among smart devices, both personal mobile devices and Internet
of Things (IoT) devices. Comparison and assessment of SDP schemes is
troublesome, because each scheme makes different assumptions about out-of-band
channels and adversary models, and are driven by their particular use-cases. A
conceptual model that facilitates meaningful comparison among SDP schemes is
missing. We provide such a model. In this article, we survey and analyze a wide
range of SDP schemes that are described in the literature, including a number
that have been adopted as standards. A system model and consistent terminology
for SDP schemes are built on the foundation of this survey, which are then used
to classify existing SDP schemes into a taxonomy that, for the first time,
enables their meaningful comparison and analysis.The existing SDP schemes are
analyzed using this model, revealing common systemic security weaknesses among
the surveyed SDP schemes that should become priority areas for future SDP
research, such as improving the integration of privacy requirements into the
design of SDP schemes. Our results allow SDP scheme designers to create schemes
that are more easily comparable with one another, and to assist the prevention
of persisting the weaknesses common to the current generation of SDP schemes.Comment: 34 pages, 5 figures, 3 tables, accepted at IEEE Communications
Surveys & Tutorials 2017 (Volume: PP, Issue: 99
- …