Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics

M Mahbub - Journal of Network and Computer Applications, 2020 - Elsevier
The IoT is the upcoming one of the major networking technologies. Using the IoT, different
items or devices can be allowed to continuously generate, obtain, and exchange …

IoT-Cognizant cloud-assisted energy efficient embedded system for indoor intelligent lighting, air quality monitoring, and ventilation

M Mahbub, MM Hossain, MSA Gazi - Internet of things, 2020 - Elsevier
Pervasive monitoring, delivered through the innovations of wireless sensor systems,
disperses across numerous areas of modern living. This enables environmental parameters …

Sok: a systematic literature review of bluetooth security threats and mitigation measures

S Shrestha, E Irby, R Thapa, S Das - International Symposium on …, 2022 - Springer
Bluetooth devices have integrated into our everyday lives such that we see an increase in
wearable technologies. Users of these devices are often unaware of the security …

A perspective on passive human sensing with bluetooth

G Iannizzotto, M Milici, A Nucita, L Lo Bello - Sensors, 2022 - mdpi.com
Passive human sensing approaches based on the analysis of the radio signals emitted by
the most common wireless communication technologies have been steadily gaining …

Exploiting bluetooth vulnerabilities in e-health IoT devices

M Zubair, D Unal, A Al-Ali, A Shikfa - Proceedings of the 3rd international …, 2019 - dl.acm.org
Internet of Things (IoT) is an interconnected network of heterogeneous things through the
Internet. The current and next generation of e-health systems are dependent on IoT devices …

Every byte matters: Traffic analysis of bluetooth wearable devices

L Barman, A Dumur, A Pyrgelis… - Proceedings of the ACM on …, 2021 - dl.acm.org
Wearable devices such as smartwatches, fitness trackers, and blood-pressure monitors
process, store, and communicate sensitive and personal information related to the health …

Integrated machine learning techniques for preserving privacy in Internet of Things (IoT) systems

S Kakandwar, B Bhushan, A Kumar - … solutions for the security of Iot-based …, 2023 - Elsevier
The advances in human-driven entities has resulted in a huge amount of smart
technologies, such as smart healthcare, smart offices, smart classrooms, and various others …

An Automated Real‐Time Localization System in Highway and Tunnel Using UWB DL‐TDoA Technology

L Wen, J Han, L Song, Q Zhang, K Li… - Wireless …, 2020 - Wiley Online Library
There exists an electromagnetic shielding effect on radio signals in a tunnel, which results in
no satellite positioning signal in the tunnel scenario. Moreover, because vehicles always …

BrokenStrokes: on the (in) security of wireless keyboards

G Oligeri, S Sciancalepore, S Raponi… - Proceedings of the 13th …, 2020 - dl.acm.org
Wireless devices resorting to event-triggered communications have been proved to suffer
critical privacy issues, due to the intrinsic leakage associated with radio-frequency (RF) …

BlueShift: Probing Adaptive Frequency Hop** in Bluetooth

T Chin, N Korzak, K Sun - Proceedings of the 10th ACM Workshop on …, 2023 - dl.acm.org
Bluetooth technology is ubiquitous in today's world with the adoption of mobile phones,
wearable media, and Internet-of-Things devices. Adaptive Frequency Ho** (AFH) enables …