{"id":"https://openalex.org/W4308069176","doi":"https://doi.org/10.1109/seeda-cecnsm57760.2022.9932957","title":"Security and Privacy Vulnerabilities in Human Activity Recognition systems","display_name":"Security and Privacy Vulnerabilities in Human Activity Recognition systems","publication_year":2022,"publication_date":"2022-09-23","ids":{"openalex":"https://openalex.org/W4308069176","doi":"https://doi.org/10.1109/seeda-cecnsm57760.2022.9932957"},"language":"en","primary_location":{"id":"doi:10.1109/seeda-cecnsm57760.2022.9932957","is_oa":false,"landing_page_url":"https://doi.org/10.1109/seeda-cecnsm57760.2022.9932957","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102993627","display_name":"Vasiliki Liagkou","orcid":"https://orcid.org/0000-0002-1162-5490"},"institutions":[{"id":"https://openalex.org/I194019607","display_name":"University of Ioannina","ror":"https://ror.org/01qg3j183","country_code":"GR","type":"education","lineage":["https://openalex.org/I194019607"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Vasiliki Liagkou","raw_affiliation_strings":["University of Ioannina,Department of Informatics &#x0026; Telecommunications,Arta,Greece"],"affiliations":[{"raw_affiliation_string":"University of Ioannina,Department of Informatics &#x0026; Telecommunications,Arta,Greece","institution_ids":["https://openalex.org/I194019607"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022167675","display_name":"Sofia Sakka","orcid":"https://orcid.org/0009-0003-9206-9936"},"institutions":[{"id":"https://openalex.org/I194019607","display_name":"University of Ioannina","ror":"https://ror.org/01qg3j183","country_code":"GR","type":"education","lineage":["https://openalex.org/I194019607"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Sofia Sakka","raw_affiliation_strings":["University of Ioannina,Department of Informatics &#x0026; Telecommunications,Arta,Greece"],"affiliations":[{"raw_affiliation_string":"University of Ioannina,Department of Informatics &#x0026; Telecommunications,Arta,Greece","institution_ids":["https://openalex.org/I194019607"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009967164","display_name":"Chrysostomos Stylios","orcid":"https://orcid.org/0000-0002-2888-6515"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chrysostomos Stylios","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5102993627"],"corresponding_institution_ids":["https://openalex.org/I194019607"],"apc_list":null,"apc_paid":null,"fwci":0.9097,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.80221934,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9830999970436096,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7890440821647644},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7699543237686157},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5679501891136169},{"id":"https://openalex.org/keywords/wearable-computer","display_name":"Wearable computer","score":0.5005812644958496},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.49451467394828796},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.44203096628189087},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.4414587616920471},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4333706200122833},{"id":"https://openalex.org/keywords/wearable-technology","display_name":"Wearable technology","score":0.42571690678596497},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.42311254143714905},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.4107840061187744},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.40486037731170654},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.22718724608421326},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1622183620929718}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7890440821647644},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7699543237686157},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5679501891136169},{"id":"https://openalex.org/C150594956","wikidata":"https://www.wikidata.org/wiki/Q1334829","display_name":"Wearable computer","level":2,"score":0.5005812644958496},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.49451467394828796},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.44203096628189087},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.4414587616920471},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4333706200122833},{"id":"https://openalex.org/C54290928","wikidata":"https://www.wikidata.org/wiki/Q4845080","display_name":"Wearable technology","level":3,"score":0.42571690678596497},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.42311254143714905},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.4107840061187744},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.40486037731170654},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.22718724608421326},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1622183620929718},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/seeda-cecnsm57760.2022.9932957","is_oa":false,"landing_page_url":"https://doi.org/10.1109/seeda-cecnsm57760.2022.9932957","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 7th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.75}],"awards":[],"funders":[{"id":"https://openalex.org/F4320335322","display_name":"European Regional Development Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2148742293","https://openalex.org/W1538218606","https://openalex.org/W2352858694","https://openalex.org/W1638503251","https://openalex.org/W2365558494","https://openalex.org/W4322618537","https://openalex.org/W2088289695","https://openalex.org/W3030465350","https://openalex.org/W2374503107","https://openalex.org/W4308069176"],"abstract_inverted_index":{"Human":[0],"activity":[1],"recognition":[2],"systems":[3],"(HARS)":[4],"should":[5],"allow":[6],"the":[7,58,67,76,86,89,118,146,149,160],"secure":[8],"and":[9,24,30,52,61,80,103,123,133,139],"trustworthy":[10],"exchange":[11,108],"of":[12,18,69,78,148],"sensitive":[13],"data":[14,28,119],"between":[15,100],"several":[16],"kinds":[17],"participating":[19],"parties":[20],"with":[21,98,106,159],"different":[22,126],"aims":[23],"claims,":[25],"regarding":[26],"security,":[27],"protection,":[29],"trust":[31],"issues.":[32],"Initially":[33],"in":[34,43,88],"this":[35],"work,":[36],"a":[37,44,83,93],"security":[38,59,70],"flaw":[39],"has":[40],"been":[41],"identified":[42],"complete":[45],"medical":[46],"IoT":[47],"application":[48],"using":[49,137],"wearable":[50],"devices":[51],"smart":[53,129],"sensors.":[54],"Then,":[55],"we":[56,81,111,143],"list":[57],"vulnerabilities":[60],"attempt":[62],"to":[63],"make":[64],"suggestions":[65],"on":[66],"prevention":[68],"flaws":[71],"that":[72,120,154],"may":[73],"appear":[74],"during":[75],"implementation":[77],"HARS":[79],"analyze":[82],"specific":[84],"attack,":[85,91],"Man":[87],"Middle":[90],"where":[92],"third":[94],"malicious":[95],"entity":[96],"interferes":[97],"communication":[99],"two":[101],"entities":[102],"is":[104,121],"associated":[105],"key":[107],"protocols.":[109],"Moreover,":[110],"discuss":[112],"various":[113],"design":[114],"considerations":[115],"for":[116],"protecting":[117],"transmitted":[122],"stored":[124],"from":[125],"sources":[127],"like":[128],"wearables,":[130],"mobile":[131],"phones,":[132],"cloud":[134],"applications":[135],"by":[136],"cryptographic":[138],"privacy-preserving":[140],"techniques.":[141],"Finally,":[142],"show":[144],"how":[145],"use":[147],"OAuth2.0":[150],"protocol":[151],"can":[152],"ensure":[153],"only":[155],"authenticated":[156],"users":[157],"interact":[158],"HARS.":[161]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
