Dataset Open Access

# Index of supplementary files from "Perils of Zero-Interaction Security in the Internet of Things"

Fomichev, Mikhail; Maass, Max; Almon, Lars; Molina, Alejandro; Hollick, Matthias

### Citation Style Language JSON Export

{
"publisher": "Zenodo",
"DOI": "10.5281/zenodo.2537721",
"author": [
{
"family": "Fomichev, Mikhail"
},
{
"family": "Maass, Max"
},
{
"family": "Almon, Lars"
},
{
"family": "Molina, Alejandro"
},
{
"family": "Hollick, Matthias"
}
],
"issued": {
"date-parts": [
[
2019,
1,
11
]
]
},
"abstract": "<p>This record serves an an index to the other dataset releases that are part of the paper &quot;Perils of Zero Interaction Security in the Internet of Things&quot; by Mikhail Fomichev, Max Maass, Lars Almon, Alejandro Molina, Matthias Hollick, in Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, vol. 3, Issue 1.</p>\n\n<p>We have chosen to split the dataset into several parts to meet Zenodo size requirements and make it easier to find specific pieces of data. In total, the following datasets exist:</p>\n\n<ol>\n\t<li><strong>Raw data</strong><br>\n\tThese datasets contain raw data, as collected directly from the devices doing the recording. It includes readings from several different sensors, as well as observed WiFi and BLE signals with their signal strength, and in one case, audio recordings. This raw data can be used to repeat our own experiments, or to apply different schemes to it to have a baseline for comparisons. Four datasets exist, mapped to the three scenarios discussed in the paper:\n\t<ol>\n\t\t<li><a href=\"http://dx.doi.org/10.5281/zenodo.2537699\">Car Scenario</a></li>\n\t\t<li><a href=\"http://dx.doi.org/10.5281/zenodo.2537701\">Office Scenario</a></li>\n\t\t<li><a href=\"http://dx.doi.org/10.5281/zenodo.2537703\">Mobile Scenario</a> + <a href=\"http://dx.doi.org/10.5281/zenodo.2537984\">audio data in separate deposit</a> (with access control)</li>\n\t</ol>\n\t</li>\n\t<li><strong>Processed Data</strong><br>\n\tThe processed data is generated from the raw data using the processing code (which can be found in <a href=\"https://dx.doi.org/10.5281/zenodo.2543721\">the code repository</a>). The resulting data contains computed features from the five papers under investigation plus derived machine learning datasets, and can be used to see in detail how the schemes behave in specific situations. These datasets tend to be fairly large. Three datasets exist:\n\t<ol>\n\t\t<li><a href=\"http://dx.doi.org/10.5281/zenodo.2537705\">Car Scenario</a></li>\n\t\t<li><a href=\"http://dx.doi.org/10.5281/zenodo.2537707\">Office Scenario</a></li>\n\t\t<li><a href=\"http://dx.doi.org/10.5281/zenodo.2537709\">Mobile Scenario</a></li>\n\t</ol>\n\t</li>\n\t<li><strong>Result Data</strong><br>\n\tFinally, the result datasets contain the results of the evaluation (i.e., the computed error rates and generated plots, plus associated caches). The code used to derive these results can once again be found in the <a href=\"http://dx.doi.org/10.5281/zenodo.2543721\">source code repository</a>. Here, five datasets exist, one for each investigated paper:\n\t<ol>\n\t\t<li><a href=\"http://dx.doi.org/10.5281/zenodo.2537711\">Karapanos et al.</a></li>\n\t\t<li><a href=\"http://dx.doi.org/10.5281/zenodo.2537713\">Sch&uuml;rmann and Sigg</a></li>\n\t\t<li><a href=\"http://dx.doi.org/10.5281/zenodo.2537715\">Miettinen et al.</a></li>\n\t\t<li><a href=\"http://dx.doi.org/10.5281/zenodo.2537717\">Truong et al.</a></li>\n\t\t<li><a href=\"http://dx.doi.org/10.5281/zenodo.2537719\">Shrestha et al.</a></li>\n\t</ol>\n\t</li>\n</ol>",
"title": "Index of supplementary files from \"Perils of Zero-Interaction Security in the Internet of Things\"",
"type": "dataset",
"id": "2537721"
}
592
31
views