CPS: Breakthrough: Secure Interactions with Internet of Things

The objective of this research is to (1) gain insights into the challenges of securing interactions in Internet of Things (IoT) deployments, (2) develop a practical framework that mitigates security and privacy threats to IoT interactions, and (3) validate the proposed framework in a medium-scale IoT testbed and through user studies. The emerging IoT computing paradigm promises novel applications in almost all sectors by enabling interactions between users, sensors, and actuators. These interactions can take the form of device-to-device (e.g., Bluetooth Low Energy (BLE)) or human-to-device (e.g., voice control). By exploiting vulnerabilities in these interaction surfaces, an adversary can gain unauthorized access to the IoT, which enables tracking, profiling and posing harm to the user. With the thousands of diverse IoT manufacturers, developers, and devices, it is very challenging, if not impossible, to ensure all devices are properly secured at production and kept up-to-date after production. IoT users and administrators have to place their trust in a set of devices, with the least secure device breaking the security chain.


  • Kang G. Shin

Graduate Students

  • chunyuc
  • Dongyao Chen
  • Yu-Chih Tung
  • Kassem Fawaz
  • Huan Feng


  • Dongyao Chen and Kang G. Shin, TurnsMap: Evaluating the risk of left turns with mobile crowdsensing and deep learning, in the Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (UbiComp'19), London, UK, September 2019.
  • Chun-Yu (Daniel) Chen, Bo-Yao Lin, Junding Wang, and Kang G. Shin, Keep Others from Peeking at Your Mobile Device Screen!, in the 25th Annual International Conference on Mobile Computing and Networking (MobiCom 19), Los Cabos, Mexico, October 2019.
  • Kassem Fawaz, and Kang G. Shin, Security and Privacy in the Internet of Things, in IEEE Computer, vol. 52, no. 4, pp. 40-49, April 2019.
  • Huan Feng, Kassem Fawaz, and Kang G. Shin, WEARABLE TECHNOLOGY BRINGS SECURITY TO ALEXA AND SIRI, in GetMobile: Mobile Computing & Communications Review, vol. 22, no. 1, pp. 35-38, March 2018.
  • Yu-Chih Tung, and Kang G. Shin, Exploiting sound masking for audio privacy in smartphones, in the 14th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2019), Auckland, New Zeland, July 2019.
  • Huan Feng*, Kassem Fawaz*, and Kang G. Shin (*co-primary authors), Continuous Authentication for Voice Assistants, in the 23rd Annual International Conference on Mobile Computing and Networking (ACM MobiCom '17), Snowbird, Utah, USA, October 2017.
  • Dongyao Chen, Kang G. Shin, Yurong Jiang, and Kyu-Han Kim, Locating and Tracking BLE Beacons with Smartphones, in the 13th International Conference on Emerging Networking EXperiments and Technologies (CoNEXT '17), Seoul/Incheon, South Korea, December 2017.