Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics
M Mahbub - Journal of Network and Computer Applications, 2020 - Elsevier
The IoT is the upcoming one of the major networking technologies. Using the IoT, different
items or devices can be allowed to continuously generate, obtain, and exchange …
items or devices can be allowed to continuously generate, obtain, and exchange …
IoT-Cognizant cloud-assisted energy efficient embedded system for indoor intelligent lighting, air quality monitoring, and ventilation
Pervasive monitoring, delivered through the innovations of wireless sensor systems,
disperses across numerous areas of modern living. This enables environmental parameters …
disperses across numerous areas of modern living. This enables environmental parameters …
Sok: a systematic literature review of bluetooth security threats and mitigation measures
Bluetooth devices have integrated into our everyday lives such that we see an increase in
wearable technologies. Users of these devices are often unaware of the security …
wearable technologies. Users of these devices are often unaware of the security …
A perspective on passive human sensing with bluetooth
Passive human sensing approaches based on the analysis of the radio signals emitted by
the most common wireless communication technologies have been steadily gaining …
the most common wireless communication technologies have been steadily gaining …
Exploiting bluetooth vulnerabilities in e-health IoT devices
Internet of Things (IoT) is an interconnected network of heterogeneous things through the
Internet. The current and next generation of e-health systems are dependent on IoT devices …
Internet. The current and next generation of e-health systems are dependent on IoT devices …
Every byte matters: Traffic analysis of bluetooth wearable devices
L Barman, A Dumur, A Pyrgelis… - Proceedings of the ACM on …, 2021 - dl.acm.org
Wearable devices such as smartwatches, fitness trackers, and blood-pressure monitors
process, store, and communicate sensitive and personal information related to the health …
process, store, and communicate sensitive and personal information related to the health …
Integrated machine learning techniques for preserving privacy in Internet of Things (IoT) systems
The advances in human-driven entities has resulted in a huge amount of smart
technologies, such as smart healthcare, smart offices, smart classrooms, and various others …
technologies, such as smart healthcare, smart offices, smart classrooms, and various others …
An Automated Real‐Time Localization System in Highway and Tunnel Using UWB DL‐TDoA Technology
L Wen, J Han, L Song, Q Zhang, K Li… - Wireless …, 2020 - Wiley Online Library
There exists an electromagnetic shielding effect on radio signals in a tunnel, which results in
no satellite positioning signal in the tunnel scenario. Moreover, because vehicles always …
no satellite positioning signal in the tunnel scenario. Moreover, because vehicles always …
BrokenStrokes: on the (in) security of wireless keyboards
Wireless devices resorting to event-triggered communications have been proved to suffer
critical privacy issues, due to the intrinsic leakage associated with radio-frequency (RF) …
critical privacy issues, due to the intrinsic leakage associated with radio-frequency (RF) …
BlueShift: Probing Adaptive Frequency Hop** in Bluetooth
Bluetooth technology is ubiquitous in today's world with the adoption of mobile phones,
wearable media, and Internet-of-Things devices. Adaptive Frequency Ho** (AFH) enables …
wearable media, and Internet-of-Things devices. Adaptive Frequency Ho** (AFH) enables …