2017
DOI: 10.1109/jiot.2016.2619679
|View full text |Cite
|
Sign up to set email alerts
|

S2M: A Lightweight Acoustic Fingerprints-Based Wireless Device Authentication Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
64
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
4

Relationship

1
9

Authors

Journals

citations
Cited by 155 publications
(67 citation statements)
references
References 31 publications
1
64
0
Order By: Relevance
“…At the same time, the effectiveness of injecting fake sounds is still not widely assessed in practical conditions. Indeed, the effectiveness of these techniques should be carefully evaluated in the presence of attackers able to recognize and to tell apart sounds emitted by a speaker and mechanical sounds, recalling the technique used in [66].…”
Section: Research Challenges and Future Research Directionsmentioning
confidence: 99%
“…At the same time, the effectiveness of injecting fake sounds is still not widely assessed in practical conditions. Indeed, the effectiveness of these techniques should be carefully evaluated in the presence of attackers able to recognize and to tell apart sounds emitted by a speaker and mechanical sounds, recalling the technique used in [66].…”
Section: Research Challenges and Future Research Directionsmentioning
confidence: 99%
“…The localization accuracy can be improved if the reader probes sufficient number of reference tags. Some applications for the vehicular networks are described in Quan et al 17 and Cheng et al 18 The security issues are discussed in Chen et al 19,20 System design and implementation…”
Section: Related Workmentioning
confidence: 99%
“…However, due to the openness of wireless communications, malicious receivers within the cover range can illegitimately access the spectrum bands and analyze the transmission without being detected, which makes the confidential message transferred through a satellite communications network vulnerable to eavesdropping attacks [1]. To handle this issue, conventional approaches for data privacy implemented at upper layer protocol stack [2], which mainly focus on the computational complexity of cryptographic algorithms, have been widely used for guaranteeing communication security [3]. However, most of the existing cryptography-based strategies are computationally secure and thus could be compromised when the eavesdropper has powerful computing capability; for example, quantum computing is available [4,5].…”
Section: Introductionmentioning
confidence: 99%