Gerhard P. Hancke

Orcid: 0000-0002-2388-3542

Affiliations:
  • City University of Hong Kong, Department of Computer Science, Hong Kong
  • Royal Holloway University of London, Egham Hill, Information Security Group, UK
  • University of Cambridge, Computer Laboratory, UK
  • University of Pretoria, Department of Electrical, Electronic and Computer Engineering, South Africa


According to our database1, Gerhard P. Hancke authored at least 210 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
NLOS Identification and Mitigation for Time-based Indoor Localization Systems: Survey and Future Research Directions.
ACM Comput. Surv., December, 2024

Transfer Learning-Based NLOS Identification for UWB in Dynamic Obstructed Settings.
IEEE Trans. Ind. Informatics, March, 2024

Adaptive Interference Avoidance and Mode Selection Scheme for D2D-Enabled Small Cells in 5G-IIoT Networks.
IEEE Trans. Ind. Informatics, February, 2024

Boosting Weakly-Supervised Referring Image Segmentation via Progressive Comprehension.
CoRR, 2024

A Scheme for Distributed Vehicle Authentication and Revocation in Decentralized VANETs.
IEEE Access, 2024

Using Ambient Sensors for Proximity and Relay Attack Detection in NFC Transactions: A Reproducibility Study.
IEEE Access, 2024

A Survey on NB-IoT Random Access: Approaches for Uplink Radio Access Network Congestion Management.
IEEE Access, 2024

Efficient Microservice Deployment in the Edge-Cloud Networks With Policy-Gradient Reinforcement Learning.
IEEE Access, 2024

ThemeStation: Generating Theme-Aware 3D Assets from Few Exemplars.
Proceedings of the ACM SIGGRAPH 2024 Conference Papers, 2024

NLOS Identification and Mitigation with WiFi: A Performance Evaluation in Dynamic Environments.
Proceedings of the IEEE International Conference on Industrial Technology, 2024

Physical Layer Key Sharing for an Off-The-Shelf UWB Module.
Proceedings of the IEEE International Conference on Industrial Technology, 2024

Color Shift Estimation-and-Correction for Image Enhancement.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

2023
Language-based Photo Color Adjustment for Graphic Designs.
ACM Trans. Graph., August, 2023

IoT-Enabled WBAN and Machine Learning for Speech Emotion Recognition in Patients.
Sensors, March, 2023

Practical Challenges of Attack Detection in Microgrids Using Machine Learning.
J. Sens. Actuator Networks, February, 2023

Complete Area ϵ-Probability Coverage in Solar Insecticidal Lamps Internet of Things.
IEEE Internet Things J., 2023

A Standardized Edge Computing Infrastructure of LoRaWAN Using IEEE 2668.
Proceedings of the 21st IEEE International Conference on Industrial Informatics, 2023

UWB-Based NLOS Identification and Mitigation: A Performance Evaluation in Dynamic Settings.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

Knock-to-Enter Authentication: A Rhythm-Based Smartphone Authentication Mechanism.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

Phone Pick-up Authentication: A Gesture-Based Smartphone Authentication Mechanism.
Proceedings of the IEEE International Conference on Industrial Technology, 2023

Adaptive Illumination Mapping for Shadow Detection in Raw Images.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Referring Image Segmentation Using Text Supervision.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Learning Image Harmonization in the Linear Color Space.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Cross-domain Semantic Decoupling for Weakly-Supervised Semantic Segmentation.
Proceedings of the 34th British Machine Vision Conference 2023, 2023

2022

Revisiting Error-Correction in Precommitment Distance-Bounding Protocols.
IEEE Trans. Ind. Informatics, 2022

Physical Security and Safety of IoT Equipment: A Survey of Recent Advances and Opportunities.
IEEE Trans. Ind. Informatics, 2022

Guest Editorial: Reliability and Security for Intelligent Wireless Sensing and Control Systems.
IEEE Trans. Ind. Informatics, 2022

Quantum-Safe Group Key Establishment Protocol from Lattice Trapdoors.
Sensors, 2022

A Fuzzy-Logic Based Adaptive Data Rate Scheme for Energy-Efficient LoRaWAN Communication.
J. Sens. Actuator Networks, 2022

Half-Duplex Mode-Based Secure Key Generation Method for Resource-Constrained IoT Devices.
IEEE Internet Things J., 2022

An optimization-based congestion control for constrained application protocol.
Int. J. Netw. Manag., 2022

Keypad entry inference with sensor fusion from mobile and smart wearables.
Comput. Secur., 2022

Investigating Distance Bounding for Delegated Proof-of-Proximity Consensus within IIoT.
Proceedings of the 31st IEEE International Symposium on Industrial Electronics, 2022

Feasibility of using Gyroscope to Derive Keys for Mobile Phone and Smart Wearable.
Proceedings of the 20th IEEE International Conference on Industrial Informatics, 2022

A Head Motion Recognition Approach for Alertness Detection.
Proceedings of the 20th IEEE International Conference on Industrial Informatics, 2022

Learning Object Context for Novel-view Scene Layout Generation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

2021
From Industry 4.0 to Agriculture 4.0: Current Status, Enabling Technologies, and Research Challenges.
IEEE Trans. Ind. Informatics, 2021

Guest Editorial: Sustainable and Intelligent Precision Agriculture.
IEEE Trans. Ind. Informatics, 2021

Preventing Overshadowing Attacks in Self-Jamming Audio Channels.
IEEE Trans. Dependable Secur. Comput., 2021

Amplitude quantization method for autonomous threshold estimation in self-reconfigurable cognitive radio systems.
Phys. Commun., 2021

Privacy-Preserving Group Authentication for RFID Tags Using Bit-Collision Patterns.
IEEE Internet Things J., 2021

A Provenance-Aware Distributed Trust Model for Resilient Unmanned Aerial Vehicle Networks.
IEEE Internet Things J., 2021

Generalized self-tuning system for adaptive threshold estimators in cognitive radio systems using swarm and evolutionary-based approaches.
Trans. Emerg. Telecommun. Technol., 2021

Towards achieving efficient MAC protocols for WBAN-enabled IoT technology: a review.
EURASIP J. Wirel. Commun. Netw., 2021

Feasibility of Inferring Keystrokes on PEDs with Sensors from Mobile Devices.
Proceedings of the 30th IEEE International Symposium on Industrial Electronics, 2021

Performance Analysis of Machine Learning Classifiers for Pothole Road Anomaly Segmentation.
Proceedings of the 30th IEEE International Symposium on Industrial Electronics, 2021

OTP-Based Symmetric Group Key Establishment Scheme for IoT Networks.
Proceedings of the IECON 2021, 2021

Mobile Proximity Channel Using Vibration.
Proceedings of the IECON 2021, 2021

Efficient Implementation of Kyber on Mobile Devices.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

Multi-Level IoT Device Identification.
Proceedings of the 27th IEEE International Conference on Parallel and Distributed Systems, 2021

Light Source Guided Single-Image Flare Removal from Unpaired Data.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

From Relay Attacks to Distance-Bounding Protocols.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
Ranging Error Mitigation for Through-the-Wall Non-Line-of-Sight Conditions.
IEEE Trans. Ind. Informatics, 2020

Cognitive Radio in Low Power Wide Area Network for IoT Applications: Recent Approaches, Benefits and Challenges.
IEEE Trans. Ind. Informatics, 2020

A Session Hijacking Attack Against a Device-Assisted Physical-Layer Key Agreement.
IEEE Trans. Ind. Informatics, 2020

Guest Editorial: Security, Privacy, and Trust for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020

Energy-Efficient Distance-Bounding with Residual Charge Computation.
IEEE Trans. Emerg. Top. Comput., 2020

AACS: Attribute-Based Access Control Mechanism for Smart Locks.
Symmetry, 2020

A cuckoo search optimization-based forward consecutive mean excision model for threshold adaptation in cognitive radio.
Soft Comput., 2020

SDNMM - A Generic SDN-Based Modular Management System for Wireless Sensor Networks.
IEEE Syst. J., 2020

Behavioral Acoustic Emanations: Attack and Verification of PIN Entry Using Keypress Sounds.
Sensors, 2020

Low Power Wide Area Network, Cognitive Radio and the Internet of Things: Potentials for Integration.
Sensors, 2020

Adaptive threshold techniques for cognitive radio-based low power wide area network.
Trans. Emerg. Telecommun. Technol., 2020

CACC: Context-aware congestion control approach for lightweight CoAP/UDP-based Internet of Things traffic.
Trans. Emerg. Telecommun. Technol., 2020

Autonomous Interference Mapping for Industrial IoT Networks over Unlicensed Bands.
CoRR, 2020

Introduction to the special section on blockchain techniques for the internet of vehicles security (VSI-bciov).
Comput. Electr. Eng., 2020

Behavioural Intrusion Detection in Water Distribution Systems Using Neural Networks.
IEEE Access, 2020

Security and Privacy in the Industrial Internet of Things: Current Standards and Future Challenges.
IEEE Access, 2020

A Review on Challenges of Autonomous Mobile Robot and Sensor Fusion Methods.
IEEE Access, 2020

Off-the-Shelf Security Testing Platform for Contactless Systems.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

Around-the-Corner or Through-the-Wall? Classification of Non-Line-of-Sight Conditions.
Proceedings of the 18th IEEE International Conference on Industrial Informatics, 2020

Enhanced security in industrial internet of things networks using latency based fingerprinting.
Proceedings of the 18th IEEE International Conference on Industrial Informatics, 2020

Non-Line-of-Sight Identification Without Channel Statistics.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

A Delegated Proof of Proximity Scheme for Industrial Internet of Things Consensus.
Proceedings of the 46th Annual Conference of the IEEE Industrial Electronics Society, 2020

2019
Deformable Object Tracking With Gated Fusion.
IEEE Trans. Image Process., 2019

Fragmentation-Based Distributed Control System for Software-Defined Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2019

Introduction to the Special Issue on Cryptographic Engineering for Internet of Things: Security Foundations, Lightweight Solutions, and Attacks.
ACM Trans. Embed. Comput. Syst., 2019

Evaluating the Implications of Varying Bluetooth Low Energy (BLE) Transmission Power Levels on Wireless Indoor Localization Accuracy and Precision.
Sensors, 2019

An Effective Spectrum Handoff Based on Reinforcement Learning for Target Channel Selection in the Industrial Internet of Things.
Sensors, 2019

A Survey on LPWAN Technologies in WBAN for Remote Health-Care Monitoring.
Sensors, 2019

Attack detection in water distribution systems using machine learning.
Hum. centric Comput. Inf. Sci., 2019

Automatic fine-grained access control in SCADA by machine learning.
Future Gener. Comput. Syst., 2019

Histogram partitioning algorithms for adaptive and autonomous threshold estimation in cognitive radio-based industrial wireless sensor networks.
Trans. Emerg. Telecommun. Technol., 2019

Efficient controller placement and reelection mechanism in distributed control system for software defined wireless sensor networks.
Trans. Emerg. Telecommun. Technol., 2019

Security of Distance-Bounding: A Survey.
ACM Comput. Surv., 2019

A delay-aware spectrum handoff scheme for prioritized time-critical industrial applications with channel selection strategy.
Comput. Commun., 2019

Sleep Scheduling for Unbalanced Energy Harvesting in Industrial Wireless Sensor Networks.
IEEE Commun. Mag., 2019

SMPKR: Search Engine for Internet of Things.
IEEE Access, 2019

Indoor Localization using Wireless Fidelity (WiFi) and Bluetooth Low Energy (BLE) signals.
Proceedings of the 28th IEEE International Symposium on Industrial Electronics, 2019

A Comparison of Data Aggregation Techniques in Software-Defined Wireless Sensor Network.
Proceedings of the 28th IEEE International Symposium on Industrial Electronics, 2019

An Approach to Improve Location Accuracy in Non-Line-of-Sight Scenarios using Floor Plans.
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019

Towards Cognitive Radio in Low Power Wide Area Network for Industrial IoT Applications.
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019

Exploring Control-Message Quenching in SDN-based Management of 6LoWPANs.
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019

Approaches for Best-Effort Relay-Resistant Channels on Standard Contactless Channels.
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019

Developing a Secure, Smart Microgrid Energy Market using Distributed Ledger Technologies.
Proceedings of the 17th IEEE International Conference on Industrial Informatics, 2019

Data Aggregation in Software-Defined Wireless Sensor Networks: A Review.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

A Review of Wireless Sensor Network Localisation Based on Software Defined Networking.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

End-to-End Wireless Control Plane for SDN in Data Centers.
Proceedings of the 9th International Conference on Information Communication and Management, 2019

Correlation-Based Search against Friendly Jamming Data Exchange Schemes.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Security Implications of Implementing Multistate Distance-Bounding Protocols.
Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy, 2019

2018
Two-Hop Distance-Bounding Protocols: Keep Your Friends Close.
IEEE Trans. Mob. Comput., 2018

Fast Convergence Cooperative Dynamic Spectrum Access for Cognitive Radio Networks.
IEEE Trans. Ind. Informatics, 2018

Security and Privacy for the Industrial Internet of Things: An Overview of Approaches to Safeguarding Endpoints.
IEEE Signal Process. Mag., 2018

A Survey of Anomaly Detection in Industrial Wireless Sensor Networks with Critical Water System Infrastructure as a Case Study.
Sensors, 2018

Overlay Virtualized Wireless Sensor Networks for Application in Industrial Internet of Things: A Review.
Sensors, 2018

A comparative analysis of local and global adaptive threshold estimation techniques for energy detection in cognitive radio.
Phys. Commun., 2018

Localised information fusion techniques for location discovery in wireless sensor networks.
Int. J. Sens. Networks, 2018

Exploring relationship between indistinguishability-based and unpredictability-based RFID privacy models.
Future Gener. Comput. Syst., 2018

HB+DB: Distance bounding meets human based authentication.
Future Gener. Comput. Syst., 2018

Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context.
Comput. Secur., 2018

Performance Costs of Software Cryptography in Securing New-Generation Internet of Energy Endpoint Devices.
IEEE Access, 2018

A Survey on 5G Networks for the Internet of Things: Communication Technologies and Challenges.
IEEE Access, 2018

Problem of Wireless Fingerprint Duplication in Fingerprinting Based Indoor Localization.
Proceedings of the 27th IEEE International Symposium on Industrial Electronics, 2018

Analysis of Bluetooth Low Energy (BLE) Based Indoor Localization System with Multiple Transmission Power Levels.
Proceedings of the 27th IEEE International Symposium on Industrial Electronics, 2018

WiFi Based Indoor Positioning Using Pattern Recognition.
Proceedings of the 27th IEEE International Symposium on Industrial Electronics, 2018

Survey of Proximity Based Authentication Mechanisms for the Industrial Internet of Things.
Proceedings of the IECON 2018, 2018

Continuous User Authentication in Smartphones Using Gait Analysis.
Proceedings of the IECON 2018, 2018

An Ultrasonic Indoor Positioning System for Harsh Environments.
Proceedings of the IECON 2018, 2018

2017
Analysis of Energy-Efficient Connected Target Coverage Algorithms for Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2017

Software Defined Networking for Improved Wireless Sensor Network Management: A Survey.
Sensors, 2017

Pose Estimation of a Mobile Robot Based on Fusion of IMU Data and Vision Data Using an Extended Kalman Filter.
Sensors, 2017

A survey of cognitive radio handoff schemes, challenges and issues for industrial wireless sensor networks (CR-IWSN).
J. Netw. Comput. Appl., 2017

User-Centric Key Entropy: Study of Biometric Key Derivation Subject to Spoofing Attacks.
Entropy, 2017

A Survey on Software-Defined Wireless Sensor Networks: Challenges and Design Requirements.
IEEE Access, 2017

The Fall of One, the Rise of Many: A Survey on Multi-Biometric Fusion Methods.
IEEE Access, 2017

ALWadHA Localization Algorithm: Yet More Energy Efficient.
IEEE Access, 2017

Behavioural sensor data as randomness source for IoT devices.
Proceedings of the 26th IEEE International Symposium on Industrial Electronics, 2017

An ultrasonic-based localization system for underground mines.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

Review of state-of-the-art wireless technologies and applications in smart cities.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

A bluetooth low energy based system for personnel tracking.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Towards a distributed control system for software defined Wireless Sensor Networks.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Sound based localization and identification in industrial environments.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Characterization of non-line of sight paths using 802.15.4a.
Proceedings of the IEEE International Conference on Industrial Technology, 2017

Energy efficient irrigation scheduling system based on the ISO/IEC/IEEE 21451 standards.
Proceedings of the IEEE International Conference on Industrial Technology, 2017

A session hijacking attack on physical layer key generation agreement.
Proceedings of the IEEE International Conference on Industrial Technology, 2017

Sleep scheduling for critical nodes in group-based industrial wireless sensor networks.
Proceedings of the 2017 IEEE International Conference on Communications Workshops, 2017

May the Force Be with You: Force-Based Relay Attack Detection.
Proceedings of the Smart Card Research and Advanced Applications, 2017

Pose estimation of a mobile robot using monocular vision and inertial sensors data.
Proceedings of the IEEE AFRICON 2017, Cape Town, South Africa, September 18-20, 2017, 2017

RFID and Contactless Technology.
Proceedings of the Smart Cards, Tokens, Security and Applications, 2017

2016
IR-UWB-Based Non-Line-of-Sight Identification in Harsh Environments: Principles and Challenges.
IEEE Trans. Ind. Informatics, 2016

Multiple Region of Interest Coverage in Camera Sensor Networks for Tele-Intensive Care Units.
IEEE Trans. Ind. Informatics, 2016

Guest Editorial Healthcare Systems and Technologies.
IEEE Trans. Ind. Informatics, 2016

Traffic Management for Emergency Vehicle Priority Based on Visual Sensing.
Sensors, 2016

Practical limitation of co-operative RFID jamming methods in environments without accurate signal synchronization.
Comput. Networks, 2016

Special issue on recent advances in physical-layer security.
Comput. Networks, 2016

Self-jamming Audio Channels: Investigating the Feasibility of Perceiving Overshadowing Attacks.
Proceedings of the Radio Frequency Identification and IoT Security, 2016

Wearable security: Key derivation for Body Area sensor Networks based on host movement.
Proceedings of the 25th IEEE International Symposium on Industrial Electronics, 2016

Wearable device localisation using machine learning techniques.
Proceedings of the 25th IEEE International Symposium on Industrial Electronics, 2016

A portable IR-UWB based WSN for personnel tracking in emergency scenarios.
Proceedings of the 14th IEEE International Conference on Industrial Informatics, 2016

A framework for user-centric key sharing in personal sensor networks.
Proceedings of the 14th IEEE International Conference on Industrial Informatics, 2016

Packets distribution in a tree-based topology Wireless Sensor Networks.
Proceedings of the 14th IEEE International Conference on Industrial Informatics, 2016

Towards non-line-of-sight ranging error mitigation in industrial wireless sensor networks.
Proceedings of the IECON 2016, 2016

A wireless system for indoor air quality monitoring.
Proceedings of the IECON 2016, 2016

Energy Efficient Scalable Video Manycast in Wireless Ad-hoc NETworks.
Proceedings of the IECON 2016, 2016

When Innovation Meets Evolution: An Extensive Study of Emerging e-Learning Technologies for Higher Education in Hong Kong.
Proceedings of the Emerging Technologies for Education - First International Symposium, 2016

Public key cryptography: Feasible for security in modern personal area sensor networks?
Proceedings of the IEEE International Conference on Industrial Technology, 2016

Cognitiva - A cognitive industrial wireless network protocol: Protocol design and testbed implementation.
Proceedings of the IEEE International Conference on Industrial Technology, 2016

Efficient video multicast in wireless surveillance networks for intelligent building.
Proceedings of the IEEE International Conference on Industrial Technology, 2016

2015
Experimental Link Quality Characterization of Wireless Sensor Networks for Underground Monitoring.
IEEE Trans. Ind. Informatics, 2015

Using Cognitive Radio for Interference-Resistant Industrial Wireless Sensor Networks: An Overview.
IEEE Trans. Ind. Informatics, 2015

Open Hardware: A Role to Play in Wireless Sensor Networks?
Sensors, 2015

Using Distance-Bounding Protocols to Securely Verify the Proximity of Two-Hop Neighbours.
IEEE Commun. Lett., 2015

Device Synchronisation: A Practical Limitation on Reader Assisted Jamming Methods for RFID Confidentiality.
Proceedings of the Information Security Theory and Practice, 2015

HB+DB, mitigating man-in-the-middle attacks against HB+ with distance bounding.
Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2015

How to Demonstrate Our Presence Without Disclosing Identity? Evidence from a Grouping-Proof Protocol.
Proceedings of the Information Security Applications - 16th International Workshop, 2015

Data aggregation using homomorphic encryption in wireless sensor networks.
Proceedings of the 2015 Information Security for South Africa, 2015

Classifying tachycardias via high dimensional linear discriminant function and perceptron with mult-piece domain activation function.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

Practical challenges of IR-UWB based ranging in harsh industrial environments.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

Smartphone: The key to your connected smart home.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

A service-oriented architecture for wireless video sensor networks: Opportunities and challenges.
Proceedings of the IECON 2015, 2015

Enhanced centroid localization of wireless sensor nodes using linear and neighbor weighting mechanisms.
Proceedings of the 9th International Conference on Ubiquitous Information Management and Communication, 2015

Rapid prototyping of a wireless sensor network gateway for the internet of things using off-the-shelf components.
Proceedings of the IEEE International Conference on Industrial Technology, 2015

2014
Guest Editorial Special Section on Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2014

Guest Editorial Special Section on Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2014

Dynamic spectrum allocation for smart meter networks and WSNs in the presence of household consumer networks.
Proceedings of the 23rd IEEE International Symposium on Industrial Electronics, 2014

Implementing the Internet of Things vision in industrial wireless sensor networks.
Proceedings of the 12th IEEE International Conference on Industrial Informatics, 2014

Benchmarking Internet of things devices.
Proceedings of the 12th IEEE International Conference on Industrial Informatics, 2014

Positioning infrastructure for industrial automation systems based on UWB wireless communication.
Proceedings of the IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA, October 29, 2014

Energy consumption audit system for smart building.
Proceedings of the IECON 2014 - 40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA, October 29, 2014

DTLS for Lightweight Secure Data Streaming in the Internet of Things.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Security of Embedded Location Systems.
Proceedings of the Secure Smart Embedded Devices, Platforms and Applications, 2014

2013
Distance Bounding: A Practical Security Solution for Real-Time Location Systems.
IEEE Trans. Ind. Informatics, 2013

The Role of Advanced Sensing in Smart Cities.
Sensors, 2013

An efficient distributed localisation algorithm for wireless sensor networks: based on smart reference-selection method.
Int. J. Sens. Networks, 2013

Introduction to Industrial Control Networks.
IEEE Commun. Surv. Tutorials, 2013

SSL Usage in Commercial Internet of Things Platforms.
Proceedings of the Radio Frequency Identification System Security, 2013

A remote moniotring patient Homecare Gateway supporting streaming vital sign monitoring.
Proceedings of the IECON 2013, 2013

Evaluating ALWadHA for providing secure localisation for wireless sensor networks.
Proceedings of the AFRICON 2013, Pointe aux Piments, Mauritius, September 9-12, 2013, 2013

2012
Distance-bounding for RFID: Effectiveness of 'terrorist fraud' in the presence of bit errors.
Proceedings of the 2012 IEEE International Conference on RFID-Technologies and Applications, 2012

Tag Group Authentication Using Bit-Collisions.
Proceedings of the 2012 Information Security for South Africa, 2012

2011
Design of a secure distance-bounding channel for RFID.
J. Netw. Comput. Appl., 2011

Practical eavesdropping and skimming attacks on high-frequency RFID tokens.
J. Comput. Secur., 2011

Actor coordination using info-gap decision theory in wireless sensor and actor networks.
Int. J. Sens. Networks, 2011

Practical Relay Attack on Contactless Transactions by Using NFC Mobile Phones.
IACR Cryptol. ePrint Arch., 2011

Using NFC-enabled phones for remote data acquisition and digital control.
Proceedings of the AFRICON 2011, 2011

ns-2 extension to simulate localization system in wireless sensor networks.
Proceedings of the AFRICON 2011, 2011

2010
Practical NFC Peer-to-Peer Relay Attack using Mobile Phones.
IACR Cryptol. ePrint Arch., 2010

A location based security framework for authenticating mobile phones.
Proceedings of the 2nd International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-MPAC 2010), 2010

A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions.
Proceedings of the Sixth Advanced International Conference on Telecommunications, 2010

2009
Transport ticketing security and fraud controls.
Inf. Secur. Tech. Rep., 2009

Attacking smart card systems: Theory and practice.
Inf. Secur. Tech. Rep., 2009

Confidence in smart token proximity: Relay attacks revisited.
Comput. Secur., 2009

Potential misuse of NFC enabled mobile phones with embedded security elements as contactless attack platforms.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

2008
Security of proximity identification systems.
PhD thesis, 2008

Attacks on time-of-flight distance bounding channels.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

2007
Modulating a noisy carrier signal for eavesdropping-resistant HF RFID.
Elektrotech. Informationstechnik, 2007

2006
Practical Attacks on Proximity Identification Systems (Short Paper).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

2005
An RFID Distance Bounding Protocol.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005


  Loading...