{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:23:25Z","timestamp":1755998605018,"version":"3.37.3"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,3]],"date-time":"2022-10-03T00:00:00Z","timestamp":1664755200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100007458","name":"Qatar Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007458","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008982","name":"QNRF","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,3]]},"DOI":"10.1109\/cns56114.2022.9947258","type":"proceedings-article","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T20:49:54Z","timestamp":1668804594000},"page":"109-117","source":"Crossref","is-referenced-by-count":2,"title":["Eolo: IoT Proximity-based Authentication via Pressure Correlated Variations"],"prefix":"10.1109","author":[{"given":"Omar Adel","family":"Ibrahim","sequence":"first","affiliation":[{"name":"Hamad Bin Khalifa University (HBKU), College of Science and Engineering (CSE),Information and Computing Technology (ICT) Division,Doha,Qatar"}]},{"given":"Gabriele","family":"Oligeri","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University (HBKU), College of Science and Engineering (CSE),Information and Computing Technology (ICT) Division,Doha,Qatar"}]},{"given":"Roberto","family":"Di Pietro","sequence":"additional","affiliation":[{"name":"Hamad Bin Khalifa University (HBKU), College of Science and Engineering (CSE),Information and Computing Technology (ICT) Division,Doha,Qatar"}]}],"member":"263","reference":[{"journal-title":"Data sheet BMP280 Digital Pressure Sensor","year":"2020","key":"ref33"},{"key":"ref32","article-title":"Oil and gas process monitoring through wireless sensor networks: A survey","volume":"6","author":"adejo","year":"2013","journal-title":"Ozean Journal of Applied Sciences"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.04.004"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/358027.358053"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2270106"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2005.19"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.35"},{"key":"ref13","first-page":"29","article-title":"Manual authentication for wireless devices","volume":"7","author":"gehrmann","year":"2004","journal-title":"RSA CryptoBytes"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2006.52"},{"key":"ref15","first-page":"385","article-title":"Hapadep: human-assisted pure au-dio device pairing","author":"soriente","year":"2008","journal-title":"International Conference on Information Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2009.023426"},{"journal-title":"Beda Button-enabled Device Association","year":"2007","author":"soriente","key":"ref17"},{"key":"ref18","first-page":"253","article-title":"Amigo: Proximity-based authentication of mobile devices","author":"varshavsky","year":"2007","journal-title":"International Con-ference on Ubiquitous Computing"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814466"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.07.008"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2247758"},{"key":"ref3","article-title":"Gattacking bluetooth smart devices","author":"jasek","year":"2016","journal-title":"Black hat USA confer-ence"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68914-0_20"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72037-9_9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45427-6_10"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.51"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2505626"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5857-5_7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/10958513_4"},{"key":"ref1","first-page":"172","article-title":"The resurrecting duckling: Security issues for ad-hoc wireless networks","author":"stajano","year":"1999","journal-title":"International Workshop on Security Protocols"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3422308"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00041"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3177102.3177108"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT46805.2019.8947178"},{"key":"ref24","article-title":"Pflua-diot: a pairing free lightweight and unlinkable user access control scheme for distributed iot environments","author":"chaudhry","year":"2020","journal-title":"IEEE Systems Journal"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417286"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3458864.3467883"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3073500"}],"event":{"name":"2022 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2022,10,3]]},"location":"Austin, TX, USA","end":{"date-parts":[[2022,10,5]]}},"container-title":["2022 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9947203\/9947223\/09947258.pdf?arnumber=9947258","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,12]],"date-time":"2022-12-12T19:56:57Z","timestamp":1670875017000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9947258\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,3]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/cns56114.2022.9947258","relation":{},"subject":[],"published":{"date-parts":[[2022,10,3]]}}}