{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:08Z","timestamp":1750220648447,"version":"3.41.0"},"reference-count":7,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T00:00:00Z","timestamp":1573689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["GetMobile: Mobile Comp. and Comm."],"published-print":{"date-parts":[[2019,11,14]]},"abstract":"<jats:p>Reproducibility and realistic datasets are crucial for advancing research. Unfortunately, they are often neglected as valid scientific contributions in many young disciplines, with computer science being no exception. In this article, we show the challenges encountered when reproducing the work of others, collecting realistic data in the wild, and ensuring that our own work is reproducible in turn. The presented findings are based on our study investigating the limits of zero-interaction security (ZIS)- a novel concept, leveraging sensor data collected by Internet of Things (IoT) devices to pair or authenticate devices. In particular, we share our experiences in reproducing five state-of-the-art ZIS schemes, collecting a comprehensive dataset of sensor data from the real world, evaluating these schemes on the collected data, and releasing the data, code, and documentation to facilitate reproducibility of our results.<\/jats:p>","DOI":"10.1145\/3372300.3372304","type":"journal-article","created":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T22:07:36Z","timestamp":1573769256000},"page":"16-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Zero-Interaction Security-Towards Sound Experimental Validation"],"prefix":"10.1145","volume":"23","author":[{"given":"Mikhail","family":"Fomichev","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Max","family":"Maass","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,11,14]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314397"},{"key":"e_1_2_1_2_1","unstructured":"Fomichev M. Maass M. Almon L. Molina A. and Hollick M. (2019). A dataset for zerointeraction security systems. DOI: https:\/\/doi. org\/10.5281\/zenodo.2537721  Fomichev M. Maass M. Almon L. Molina A. and Hollick M. (2019). A dataset for zerointeraction security systems. DOI: https:\/\/doi. org\/10.5281\/zenodo.2537721"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.3389\/fninf.2017.00069"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2812803"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3081016.3081018"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308755.3308759"},{"key":"e_1_2_1_7_1","unstructured":"Stisen A. Blunck H. Bhattacharya S. Prentow T.S. Kj\u00e6rgaard M.B. Dey A. Sonne T. and Jensen M.M. (2015). Smart Devices are Different: Assessing and Mitigating Mobile Sensing Heterogeneities for Activity Recognition. ACM SenSys. 127--140. DOI:https:\/\/doi. org\/10.1145\/2809695.2809718  Stisen A. Blunck H. Bhattacharya S. Prentow T.S. Kj\u00e6rgaard M.B. Dey A. Sonne T. and Jensen M.M. (2015). Smart Devices are Different: Assessing and Mitigating Mobile Sensing Heterogeneities for Activity Recognition. ACM SenSys. 127--140. DOI:https:\/\/doi. org\/10.1145\/2809695.2809718"}],"container-title":["GetMobile: Mobile Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372300.3372304","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372300.3372304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:20Z","timestamp":1750197740000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372300.3372304"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,14]]},"references-count":7,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,11,14]]}},"alternative-id":["10.1145\/3372300.3372304"],"URL":"https:\/\/doi.org\/10.1145\/3372300.3372304","relation":{},"ISSN":["2375-0529","2375-0537"],"issn-type":[{"type":"print","value":"2375-0529"},{"type":"electronic","value":"2375-0537"}],"subject":[],"published":{"date-parts":[[2019,11,14]]},"assertion":[{"value":"2019-11-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}