ACM DL

Internet Technology (TOIT)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Internet Technology (TOIT) - Special Issue on Internet of Things (IoT): Smart and Secure Service Delivery, Volume 16 Issue 4, December 2016



Section: Special Issue on Internet of Things (IoT): Smart and Secure Service Delivery

Internet of Things (IoT): Smart and Secure Service Delivery
Elisa Bertino, Kim-Kwang Raymond Choo, Dimitrios Georgakopolous, Surya Nepal
Article No.: 22
DOI: 10.1145/3013520

The Internet of Things (IoT) is the latest Internet evolution that incorporates a diverse range of things such as sensors, actuators, and services deployed by different organizations and individuals to support a variety of applications. The...

Secure Data-Centric Access Control for Smart Grid Services Based on Publish/Subscribe Systems
Li Duan, Dongxi Liu, Yang Zhang, Shiping Chen, Ren Ping Liu, Bo Cheng, Junliang Chen
Article No.: 23
DOI: 10.1145/3007190

The communication systems in existing smart grids mainly take the request/reply interaction model, in which data access is under the direct control of data producers. This tightly controlled interaction model is not scalable to support complex...

Password-Authenticated Group Key Exchange: A Cross-Layer Design
Yuexin Zhang, Yang Xiang, Xinyi Huang
Article No.: 24
DOI: 10.1145/2955095

Two-party password-authenticated key exchange (2PAKE) protocols provide a natural mechanism for secret key establishment in distributed applications, and they have been extensively studied in past decades. However, only a few efforts have been...

Authentication Protocol for an IoT-Enabled LTE Network
Neetesh Saxena, Santiago Grijalva, Narendra S. Chaudhari
Article No.: 25
DOI: 10.1145/2981547

The Evolved Packet System-based Authentication and Key Agreement (EPS-AKA) protocol of the long-term evolution (LTE) network does not support Internet of Things (IoT) objects and has several security limitations, including transmission of the...

Advanced Security Testbed Framework for Wearable IoT Devices
Shachar Siboni, Asaf Shabtai, Nils O. Tippenhauer, Jemin Lee, Yuval Elovici
Article No.: 26
DOI: 10.1145/2981546

Analyzing the security of Wearable Internet-of-Things (WIoT) devices is considered a complex task due to their heterogeneous nature. In addition, there is currently no mechanism that performs security testing for WIoT devices in different...

Intelligent Intrusion Detection in Low-Power IoTs
Ahmed Saeed, Ali Ahmadinia, Abbas Javed, Hadi Larijani
Article No.: 27
DOI: 10.1145/2990499

Security and privacy of data are one of the prime concerns in today’s Internet of Things (IoT). Conventional security techniques like signature-based detection of malware and regular updates of a signature database are not feasible solutions...

Crowdsourced Mobile Data Transfer with Delay Bound
Ngoc Do, Ye Zhao, Cheng-Hsin Hsu, Nalini Venkatasubramanian
Article No.: 28
DOI: 10.1145/2939376

In this article, we design a crowdsourcing system, CrowdMAC, where mobile devices form a local community or marketplace to share network access and transfer data for each other. CrowdMAC enables (i) mobile clients to select and exploit multiple...

Characterization of Wireless Multidevice Users
Aveek K. Das, Parth H. Pathak, Chen-Nee Chuah, Prasant Mohapatra
Article No.: 29
DOI: 10.1145/2955096

The number of wireless-enabled devices owned by a user has had huge growth over the past few years. Over one third of adults in the United States currently own three wireless devices: a smartphone, laptop, and tablet. This article provides a study...