2019
DOI: 10.1145/3372300.3372304
|View full text |Cite
|
Sign up to set email alerts
|

Zero-Interaction Security-Towards Sound Experimental Validation

Abstract: Reproducibility and realistic datasets are crucial for advancing research. Unfortunately, they are often neglected as valid scientific contributions in many young disciplines, with computer science being no exception. In this article, we show the challenges encountered when reproducing the work of others, collecting realistic data in the wild, and ensuring that our own work is reproducible in turn. The presented findings are based on our study investigating the limits of zero-interaction security (ZIS)- a nove… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 6 publications
(12 reference statements)
0
2
0
Order By: Relevance
“…For the altitude signals, we perform mean subtraction before filtering. This helps to (1) remove offset between barometer sensors caused by hardware and temperature variation [14], (2) eliminate atmospheric pressure, accentuating altitude changes in the signal. We adapt filter parameters for signal smoothing and noise reduction from related work [6,17,27].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…For the altitude signals, we perform mean subtraction before filtering. This helps to (1) remove offset between barometer sensors caused by hardware and temperature variation [14], (2) eliminate atmospheric pressure, accentuating altitude changes in the signal. We adapt filter parameters for signal smoothing and noise reduction from related work [6,17,27].…”
Section: Methodsmentioning
confidence: 99%
“…To address this problem, recent research proposes zero-interaction pairing (ZIP) utilizing devices' context to derive a shared secret key without user involvement [14,17,28,37]. Such context is represented as a set of sensor modalities (e.g., audio, acceleration) collected by devices from their ambient environment.…”
Section: Introductionmentioning
confidence: 99%