Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

Security threats in Bluetooth technology

SS Hassan, SD Bibon, MS Hossain… - Computers & Security, 2018 - Elsevier
Bluetooth allows connecting mobile devices in short range in order to transfer files/videos. It
is now a popular means of short range wireless communication. Although Bluetooth is …

Sok: a systematic literature review of bluetooth security threats and mitigation measures

S Shrestha, E Irby, R Thapa, S Das - International Symposium on …, 2022 - Springer
Bluetooth devices have integrated into our everyday lives such that we see an increase in
wearable technologies. Users of these devices are often unaware of the security …

Technologies and applications in wireless biosensors for real-time health monitoring

Z Xu, Y Hao, A Luo, Y Jiang - Med-X, 2024 - Springer
Wireless biosensing has emerged as a critical technology due to its ability to provide real-
time, continuous monitoring of physiological parameters without the constraints of wired …

NFC based secure mobile healthcare system

D Sethia, D Gupta, T Mittal, U Arora… - 2014 sixth international …, 2014 - ieeexplore.ieee.org
With the recent increase in usage of mobile devices especially in develo** countries, they
can be used for an efficient healthcare management. In this work, we have proposed a novel …

[PDF][PDF] Wireless networks: developments, threats and countermeasures

MM Noor, WH Hassan - … Journal of Digital Information and Wireless …, 2013 - academia.edu
This paper discusses current threats in wireless networks and some academia research
reviews regarding the matters. Significant and persistent threats discussed are sniffing, Man …

Secure key exchange using enhanced Diffie-Hellman protocol based on string comparison

A Taparia, SK Panigrahy… - … International conference on …, 2017 - ieeexplore.ieee.org
Authenticated key exchange protocols play an important role in securing communications
and are extensively deployed for use in various real-world network applications. Diffie …

[PDF][PDF] Current threats of wireless networks

MM Noor, WH Hassan - The Third international conference on digital …, 2013 - core.ac.uk
This paper discusses current threats in wireless networks. Advancement and
countermeasures for each threat such as sniffing, Man In the Middle Attack (MITM), Rogue …

A robust NFC-based personalized IPTV service system

KH Yeh, NW Lo, CK Wang - Multimedia Tools and Applications, 2018 - Springer
Abstract Internet Protocol Television (IPTV) is becoming a platform that changes the way we
obtain information and entertainment, and offers interactive features and personalized …

[PDF][PDF] Near field communication based android API healthcare system

B Kartik, J Bhargav, M Mahajan… - … Journal of Research in …, 2015 - researchgate.net
With the recent increase in usage of mobile devices especially in develo** countries, they
can be used for an efficient healthcare management. In this work, we have proposed a novel …