{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T05:31:04Z","timestamp":1732080664835,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","funder":[{"name":"Defense Advanced Research Projects Agency (DARPA)","award":["HR001120C0154"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1145\/3643833.3656127","type":"proceedings-article","created":{"date-parts":[[2024,5,20]],"date-time":"2024-05-20T23:25:07Z","timestamp":1716247507000},"page":"196-206","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Swipe2Pair: Secure and Fast In-Band Wireless Device Pairing"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0009-0004-8616-7721","authenticated-orcid":false,"given":"Yaqi","family":"He","sequence":"first","affiliation":[{"name":"Wireless Cyber Center, George Mason University, Fairfax, VA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3279-0695","authenticated-orcid":false,"given":"Kai","family":"Zeng","sequence":"additional","affiliation":[{"name":"Wireless Cyber Center, George Mason University, Fairfax, VA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-6790-8932","authenticated-orcid":false,"given":"Long","family":"Jiao","sequence":"additional","affiliation":[{"name":"Department of Computer Information Science, University of Massachusetts Dartmouth, North Dartmouth, MA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4030-5592","authenticated-orcid":false,"given":"Brian L.","family":"Mark","sequence":"additional","affiliation":[{"name":"Wireless Cyber Center, George Mason University, Fairfax, VA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2116-2223","authenticated-orcid":false,"given":"Khaled N.","family":"Khasawneh","sequence":"additional","affiliation":[{"name":"Electrical and Computer Engineering Department, George Mason University, Fairfax, VA, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT.2013.6505900"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.272497"},{"key":"e_1_3_2_1_3_1","unstructured":"J.P.G van Brakel. 2014. Robust peak detection algorithm using z-scores. https:\/\/stackoverflow.com\/questions\/22583391\/peak-signal-detection-in-realtime-timeseries-data\/22640362#22640362. https:\/\/stackoverflow.com\/questions\/22583391\/peak-signal-detection-in-realtime-timeseries-data\/22640362#22640362"},{"key":"e_1_3_2_1_4_1","volume-title":"Good Neighbor: Secure pairing of nearby wireless devices by multiple antennas. In NDSS.","author":"Cai Liang","year":"2011","unstructured":"Liang Cai, Kai Zeng, Hao Chen, and Prasant Mohapatra. 2011. Good Neighbor: Secure pairing of nearby wireless devices by multiple antennas. In NDSS."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/LAWP.2008.928484"},{"key":"e_1_3_2_1_6_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Ghose Nirnimesh","year":"2017","unstructured":"Nirnimesh Ghose, Loukas Lazos, and Ming Li. 2017. $$HELP$$:$$Helper-Enabled$$$$In-Band$$ Device Pairing Resistant Against Signal Cancellation. In 26th USENIX Security Symposium (USENIX Security 17). 433--450."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3015010"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2012.253"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2010.5534913"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00041"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS56114.2022.9947258"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997514"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8887472"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1542-8"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Xiaopeng Li Qiang Zeng Lannan Luo and Tongbo Luo. 2020. T2pair: Secure and usable pairing for heterogeneous IoT devices. In ACM SIGSAC. 309--323.","DOI":"10.1145\/3372297.3417286"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.51"},{"volume-title":"Session key derivation for low power IoT devices. In 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity)","author":"McGinthy Jason","key":"e_1_3_2_1_17_1","unstructured":"Jason McGinthy and Alan Michaels. 2018. Session key derivation for low power IoT devices. In 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing,(HPSC) and IEEE International Conference on Intelligent Data and Security (IDS). IEEE, 194--203."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT46805.2019.8947178"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.30684\/etj.34.15A.15"},{"key":"e_1_3_2_1_20_1","unstructured":"T O'Haver. 2022. Pragmatic Introduction to Signal Processing: Applications in scientific measurement: An illustrated handbook with free software and spreadsheet templates to download."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3507657.3528545"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/358027.358053"},{"key":"e_1_3_2_1_23_1","first-page":"18","article-title":"Device Pairing at the Touch of an Electrode","volume":"18","author":"Roeschlin Marc","year":"2018","unstructured":"Marc Roeschlin, Ivan Martinovic, and Kasper Bonne Rasmussen. 2018. Device Pairing at the Touch of an Electrode. In NDSS, Vol. 18. 18--21.","journal-title":"NDSS"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. 1099--1112","author":"Rostami Masoud","year":"2013","unstructured":"Masoud Rostami, Ari Juels, and Farinaz Koushanfar. 2013. Heart-to-heart (H2H) authentication for implanted medical devices. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. 1099--1112."},{"volume-title":"WiFi-aware as a connectivity solution for IoT pairing IoT with WiFi aware technology: Enabling new proximity based services","author":"Saloni Shubham","key":"e_1_3_2_1_25_1","unstructured":"Shubham Saloni and Achyut Hegde. 2016. WiFi-aware as a connectivity solution for IoT pairing IoT with WiFi aware technology: Enabling new proximity based services. In IEEE IOTA. 137--142."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/371350"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3083576"},{"key":"e_1_3_2_1_28_1","article-title":"Comparison of ECC and RSA algorithms in IoT devices","volume":"97","author":"Vahdati Zeinab","year":"2019","unstructured":"Zeinab Vahdati, Sharifah Yasin, Ali Ghasempour, and Mohammad Salehi. 2019. Comparison of ECC and RSA algorithms in IoT devices. Journal of Theoretical and Applied Information Technology, Vol. 97, 16 (2019).","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"e_1_3_2_1_29_1","volume-title":"Wen Tao Zhu, and Lei Wang","author":"Wang Wei","year":"2015","unstructured":"Wei Wang, Zhan Wang, Wen Tao Zhu, and Lei Wang. 2015. WAVE: Secure wireless pairing exploiting human body movements. In 2015 IEEE Trustcom\/BigDataSE\/ISPA, Vol. 1. IEEE, 1243--1248."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/636349"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2766048"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3023954"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300061.3300118"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2694844"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2543581.2543592"},{"key":"e_1_3_2_1_36_1","first-page":"1614","article-title":"An energy-efficient dual-field elliptic curve cryptography processor for Internet of Things applications","volume":"67","author":"Yeh Ling-Yu","year":"2020","unstructured":"Ling-Yu Yeh, Po-Jen Chen, Chen-Chun Pai, and Tsung-Te Liu. 2020. An energy-efficient dual-field elliptic curve cryptography processor for Internet of Things applications. IEEE Transactions on Circuits and Systems II: Express Briefs, Vol. 67, 9 (2020), 1614--1618.","journal-title":"IEEE Transactions on Circuits and Systems II: Express Briefs"},{"volume-title":"Proximity based IoT device authentication","author":"Zhang Jiansong","key":"e_1_3_2_1_37_1","unstructured":"Jiansong Zhang, Zeyu Wang, Zhice Yang, and Qian Zhang. 2017. Proximity based IoT device authentication. In IEEE INFOCOM."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/587195"}],"event":{"name":"WiSec '24: 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Seoul Republic of Korea","acronym":"WiSec '24"},"container-title":["Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3643833.3656127","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T13:25:45Z","timestamp":1732022745000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3643833.3656127"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":38,"alternative-id":["10.1145\/3643833.3656127","10.1145\/3643833"],"URL":"https:\/\/doi.org\/10.1145\/3643833.3656127","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]},"assertion":[{"value":"2024-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}