Abstract—The secure “pairing ” of wireless devices based on out-of-band communication is an established research direction. Unfortunately, this approach is prone to human errors that lead to man-in-the-middle attacks. To address this and to better motivate users, this paper proposes the use of computer games for pairing. Games make the pairing process enjoyable and engaging, thus improving its usability and security. The technical contribution of this work is a new pairing system called “Alice Says. ” This is a game that achieves pairing and is based on the memory game Simon. We also discuss the design and implementation of Alice Says. On a broader note, this paper also points to other security problems that are currently lacking optimal so...
We propose the development of a broad range of exciting mobile interaction games using intermittentl...
Playing games over the wireless Internet is significantly more dangerous than using traditional wire...
This survey provides a structured and comprehensive overview of research on security and privacy in ...
The secure “pairing ” of wireless devices based on auxiliary or out-of-band (OOB) communication, suc...
Securely associating, or“pairing,”wireless devices via out-of-band communication channels is a well ...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
© 2018 IEEE. The Cognitive Radio can be considered as a mandatory part of the Internet of Things app...
International audiencePhysical layer security is an emerging security technology that achieves perfe...
The issue of cybersecurity has gained significant prominence in the context of safeguarding the priv...
In this thesis, we provide mathematical formulations for and investigate a number of problems that a...
In this article, the anti-jamming communication problem is investigated from a game-theoretic learni...
Dial locks are commonly used to secure a person’s items. Commercially available dial locks often use...
When users wish to establish wireless radio communication between/among their devices, the channel h...
Abstract—We formulate the wireless security problem as an indirect reciprocity game, and propose a s...
Network security is a complex and challenging problem. The area of network defense mechanism design ...
We propose the development of a broad range of exciting mobile interaction games using intermittentl...
Playing games over the wireless Internet is significantly more dangerous than using traditional wire...
This survey provides a structured and comprehensive overview of research on security and privacy in ...
The secure “pairing ” of wireless devices based on auxiliary or out-of-band (OOB) communication, suc...
Securely associating, or“pairing,”wireless devices via out-of-band communication channels is a well ...
Ad-hoc interactions between devices over wireless networks present a security problem: the generatio...
© 2018 IEEE. The Cognitive Radio can be considered as a mandatory part of the Internet of Things app...
International audiencePhysical layer security is an emerging security technology that achieves perfe...
The issue of cybersecurity has gained significant prominence in the context of safeguarding the priv...
In this thesis, we provide mathematical formulations for and investigate a number of problems that a...
In this article, the anti-jamming communication problem is investigated from a game-theoretic learni...
Dial locks are commonly used to secure a person’s items. Commercially available dial locks often use...
When users wish to establish wireless radio communication between/among their devices, the channel h...
Abstract—We formulate the wireless security problem as an indirect reciprocity game, and propose a s...
Network security is a complex and challenging problem. The area of network defense mechanism design ...
We propose the development of a broad range of exciting mobile interaction games using intermittentl...
Playing games over the wireless Internet is significantly more dangerous than using traditional wire...
This survey provides a structured and comprehensive overview of research on security and privacy in ...