A Survey on Context-based Co-presence Detection Techniques

07/18/2018
by   Mauro Conti, et al.
0

In this paper, we present a systematic survey on the proximity verification techniques that are being used in Zero-Interaction based Co-presence Detection and Authentication (ZICDA) systems. First, we discuss the possible adversary and communication models, and the existing security attacks on ZICDA systems. Then, we review the state-of-the-art proximity verification techniques that make use of contextual information. Such techniques are commonly referred as Contextual Co-presence (COCO) protocols, which dynamically collect and use the specific contextual information to improve the security of such systems. Finally, we summarize the major challenges and suggest the possible innovation and efficient future solutions for securely detecting co-presence between devices. Based on our review, we observe that detecting co-presence between devices is not only challenging but also a significant contemporary research problem. The proximity verification techniques presented in the literature usually involve trade-offs between metrics such as efficiency, security, and usability. However, currently, there is no ideal solution which adequately addresses the trade-off between these metrics. Therefore, we trust that this review gives an insight into the strengths and shortcomings of the known research methodologies.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/24/2022

Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective

Neural networks have been widely applied in security applications such a...
research
09/13/2019

Toward Efficient Evaluation of Logic Encryption Schemes: Models and Metrics

Research in logic encryption over the last decade has resulted in variou...
research
01/09/2020

Short-Range Audio Channels Security: Survey of Mechanisms, Applications, and Research Challenges

Short-range audio channels have a few distinguishing characteristics: ea...
research
06/11/2021

Model-based Safety and Security Co-analysis: a Survey

We survey the state-of-the-art on model-based formalisms for safety and ...
research
12/18/2018

LSM-based Storage Techniques: A Survey

In recent years, Log-Structured Merge-trees (LSM-trees) have been widely...
research
07/12/2022

Docent: A content-based recommendation system to discover contemporary art

Recommendation systems have been widely used in various domains such as ...
research
03/20/2018

Proximity Verification Based on Acoustic Room Impulse Response

Device proximity verification has a wide range of security applications ...

Please sign up or login with your details

Forgot password? Click here to reset