{"id":"https://openalex.org/W4309675215","doi":"https://doi.org/10.1109/cns56114.2022.9947258","title":"Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations","display_name":"Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations","publication_year":2022,"publication_date":"2022-10-03","ids":{"openalex":"https://openalex.org/W4309675215","doi":"https://doi.org/10.1109/cns56114.2022.9947258"},"language":"en","primary_location":{"id":"doi:10.1109/cns56114.2022.9947258","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns56114.2022.9947258","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034712757","display_name":"Omar Adel Ibrahim","orcid":"https://orcid.org/0000-0002-0171-8757"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":true,"raw_author_name":"Omar Adel Ibrahim","raw_affiliation_strings":["Hamad Bin Khalifa University (HBKU), College of Science and Engineering (CSE),Information and Computing Technology (ICT) Division,Doha,Qatar","Information and Computing Technology (ICT) Division, Hamad Bin Khalifa University (HBKU), College of Science and Engineering (CSE), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Hamad Bin Khalifa University (HBKU), College of Science and Engineering (CSE),Information and Computing Technology (ICT) Division,Doha,Qatar","institution_ids":["https://openalex.org/I4210144839"]},{"raw_affiliation_string":"Information and Computing Technology (ICT) Division, Hamad Bin Khalifa University (HBKU), College of Science and Engineering (CSE), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062407436","display_name":"Gabriele Oligeri","orcid":"https://orcid.org/0000-0002-9637-0430"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Gabriele Oligeri","raw_affiliation_strings":["Hamad Bin Khalifa University (HBKU), College of Science and Engineering (CSE),Information and Computing Technology (ICT) Division,Doha,Qatar","Information and Computing Technology (ICT) Division, Hamad Bin Khalifa University (HBKU), College of Science and Engineering (CSE), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Hamad Bin Khalifa University (HBKU), College of Science and Engineering (CSE),Information and Computing Technology (ICT) Division,Doha,Qatar","institution_ids":["https://openalex.org/I4210144839"]},{"raw_affiliation_string":"Information and Computing Technology (ICT) Division, Hamad Bin Khalifa University (HBKU), College of Science and Engineering (CSE), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065932621","display_name":"Roberto Di Pietro","orcid":"https://orcid.org/0000-0003-1909-0336"},"institutions":[{"id":"https://openalex.org/I4210144839","display_name":"Hamad bin Khalifa University","ror":"https://ror.org/03eyq4y97","country_code":"QA","type":"education","lineage":["https://openalex.org/I4210144839"]}],"countries":["QA"],"is_corresponding":false,"raw_author_name":"Roberto Di Pietro","raw_affiliation_strings":["Hamad Bin Khalifa University (HBKU), College of Science and Engineering (CSE),Information and Computing Technology (ICT) Division,Doha,Qatar","Information and Computing Technology (ICT) Division, Hamad Bin Khalifa University (HBKU), College of Science and Engineering (CSE), Doha, Qatar"],"affiliations":[{"raw_affiliation_string":"Hamad Bin Khalifa University (HBKU), College of Science and Engineering (CSE),Information and Computing Technology (ICT) Division,Doha,Qatar","institution_ids":["https://openalex.org/I4210144839"]},{"raw_affiliation_string":"Information and Computing Technology (ICT) Division, Hamad Bin Khalifa University (HBKU), College of Science and Engineering (CSE), Doha, Qatar","institution_ids":["https://openalex.org/I4210144839"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034712757"],"corresponding_institution_ids":["https://openalex.org/I4210144839"],"apc_list":null,"apc_paid":null,"fwci":0.6063,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.74219685,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"109","last_page":"117"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11932","display_name":"Wireless Body Area Networks","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/2204","display_name":"Biomedical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7690927982330322},{"id":"https://openalex.org/keywords/pairing","display_name":"Pairing","score":0.7048034071922302},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6366026401519775},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6260663270950317},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6242290735244751},{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.5892792344093323},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.49694469571113586},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.49271419644355774},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4829811155796051},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4673130214214325},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3623020052909851},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1279379427433014}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7690927982330322},{"id":"https://openalex.org/C14103023","wikidata":"https://www.wikidata.org/wiki/Q11681459","display_name":"Pairing","level":3,"score":0.7048034071922302},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6366026401519775},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6260663270950317},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6242290735244751},{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.5892792344093323},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.49694469571113586},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.49271419644355774},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4829811155796051},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4673130214214325},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3623020052909851},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1279379427433014},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C54101563","wikidata":"https://www.wikidata.org/wiki/Q124131","display_name":"Superconductivity","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns56114.2022.9947258","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns56114.2022.9947258","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320309815","display_name":"Qatar Foundation","ror":"https://ror.org/01cawbq05"},{"id":"https://openalex.org/F4320332753","display_name":"Qatar National Research Fund","ror":"https://ror.org/01svaqq28"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W98369833","https://openalex.org/W104882164","https://openalex.org/W1525179699","https://openalex.org/W1596662236","https://openalex.org/W2001619264","https://openalex.org/W2017264951","https://openalex.org/W2049954999","https://openalex.org/W2053024467","https://openalex.org/W2059980308","https://openalex.org/W2099042427","https://openalex.org/W2106044541","https://openalex.org/W2116897550","https://openalex.org/W2129911440","https://openalex.org/W2134251664","https://openalex.org/W2136447324","https://openalex.org/W2141136786","https://openalex.org/W2324304820","https://openalex.org/W2785936395","https://openalex.org/W2794756467","https://openalex.org/W2797284906","https://openalex.org/W2998617195","https://openalex.org/W3096980218","https://openalex.org/W3111004365","https://openalex.org/W3112926755","https://openalex.org/W3154606341","https://openalex.org/W3170891692","https://openalex.org/W4241406615","https://openalex.org/W4255955830","https://openalex.org/W6632358045","https://openalex.org/W6635527877","https://openalex.org/W6675040772","https://openalex.org/W6787248281","https://openalex.org/W7001942639"],"related_works":["https://openalex.org/W3015473028","https://openalex.org/W3201176751","https://openalex.org/W1993094293","https://openalex.org/W2029180842","https://openalex.org/W2024971119","https://openalex.org/W2057898405","https://openalex.org/W2953807518","https://openalex.org/W2258335979","https://openalex.org/W2890366349","https://openalex.org/W3119345543"],"abstract_inverted_index":{"Wireless":[0],"channels":[1],"are":[2,96],"typically":[3],"protected":[4],"by":[5,117,133],"crypto-graphic":[6],"solutions.":[7],"However,":[8],"when":[9],"those":[10],"solutions":[11],"cannot":[12],"be":[13],"applied":[14],"(e.g.":[15],"resource":[16],"constrained":[17],"such":[18,88],"as":[19,76,89],"Internet":[20],"of":[21,28,138,155,180],"Things":[22],"(IoT))":[23],"or":[24],"an":[25,143,148],"additional":[26],"layer":[27],"security":[29],"is":[30,34,129],"deemed":[31],"necessary,":[32],"it":[33],"possible":[35],"to":[36,38,55,83,98,121,166,196],"resort":[37],"auxiliary":[39],"authenticatable":[40],"out-of-band":[41],"(OOB)":[42],"channels.":[43],"In":[44],"this":[45],"paper,":[46],"we":[47,201],"introduce":[48],"Eolo,":[49],"a":[50,77,111],"novel,":[51],"zero-interaction":[52],"pairing":[53,106],"approach":[54],"secure":[56],"industrial":[57],"IoT":[58],"devices.":[59],"Our":[60,126],"solution":[61,162,183],"pairs":[62],"devices":[63,107,173],"based":[64],"on":[65,110,211],"correlated":[66],"ambient":[67],"air":[68],"pressure":[69,124,165],"data.":[70],"Eolo":[71,158],"can":[72],"serve,":[73],"among":[74],"others,":[75],"co-location,":[78],"key-based":[79],"verification":[80,171],"extension":[81],"mechanism":[82],"support":[84],"key":[85,170],"agreement":[86],"protocols":[87,95],"Diffie-Hellman":[90],"(DH).":[91],"Indeed,":[92],"the":[93,105,122,153,160,178,181,188,204],"cited":[94],"susceptible":[97],"man-in-the-middle":[99],"(MITM)":[100],"attacks.":[101],"With":[102],"our":[103,156],"solution,":[104,206],"first":[108,161],"agree":[109],"shared":[112],"secret,":[113],"then":[114],"verify":[115],"co-location":[116],"exchanging":[118],"information":[119],"related":[120],"barometric":[123,164],"readings.":[125],"proposed":[127,182,205],"methodology":[128],"also":[130,185,195,214],"experimentally":[131],"verified":[132],"more":[134],"than":[135,208],"115":[136],"hours":[137],"real":[139],"data":[140],"collected":[141],"from":[142],"extensive":[144],"measurement":[145],"campaign":[146],"in":[147,174],"open":[149],"outdoor":[150],"areas.":[151],"To":[152],"best":[154],"knowledge,":[157],"represents":[159],"leveraging":[163],"achieve":[167],"context-pairing":[168],"and":[169],"for":[172,193],"close":[175],"proximity.":[176],"Further,":[177],"applications":[179],"extends":[184],"well":[186],"beyond":[187],"discussed":[189],"scenario,":[190],"being":[191,209],"applicable":[192],"instance":[194],"underwater":[197],"context.":[198],"As":[199],"such,":[200],"believe":[202],"that":[203],"other":[207],"relevant":[210],"its":[212],"own,":[213],"opens":[215],"up":[216],"further":[217],"research":[218],"avenues.":[219]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
