Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …
Security vulnerabilities in Bluetooth technology as used in IoT
AM Lonzetta, P Cope, J Campbell, BJ Mohd… - Journal of Sensor and …, 2018 - mdpi.com
Bluetooth technology is a key component of wireless communications. It provides a low-
energy and low-cost solution for short-range radio transmissions. Bluetooth, more …
energy and low-cost solution for short-range radio transmissions. Bluetooth, more …
[BOOK][B] Hadamard matrices and their applications
KJ Horadam - 2012 - books.google.com
In Hadamard Matrices and Their Applications, KJ Horadam provides the first unified account
of cocyclic Hadamard matrices and their applications in signal and data processing. This …
of cocyclic Hadamard matrices and their applications in signal and data processing. This …
Attacks and defenses in short-range wireless technologies for IoT
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …
wireless and wired networks, geographically distributed and interconnected by a “secured” …
Bluetooth: With low energy comes low security
M Ryan - 7th USENIX Workshop on Offensive Technologies …, 2013 - usenix.org
We discuss our tools and techniques to monitor and inject packets in Bluetooth Low Energy.
Also known as BTLE or Bluetooth Smart, it is found in recent high-end smartphones, sports …
Also known as BTLE or Bluetooth Smart, it is found in recent high-end smartphones, sports …
Bias: Bluetooth impersonation attacks
Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions
of devices. The Bluetooth standard includes a legacy authentication procedure and a secure …
of devices. The Bluetooth standard includes a legacy authentication procedure and a secure …
Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …
some form of smart device in their homes or workplaces. These devices are often off-the …
Sok: The long journey of exploiting and defending the legacy of king harald bluetooth
Named after the Viking King Harald Bluetooth, Bluetooth is the de facto standard for short-
range wireless communications. The introduction of Bluetooth Low Energy (BLE) and Mesh …
range wireless communications. The introduction of Bluetooth Low Energy (BLE) and Mesh …
Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks
This study presents a healthcare monitoring architecture coupled with wearable sensor
systems and an environmental sensor network for monitoring elderly or chronic patients in …
systems and an environmental sensor network for monitoring elderly or chronic patients in …
Securing Bluetooth Low Energy networking: An overview of security procedures and threats
Abstract Bluetooth Low Energy (BLE) is rapidly becoming the de-facto standard for short-
range wireless communications among resource-constrained wireless devices. Securing …
range wireless communications among resource-constrained wireless devices. Securing …