Cybersecurity and forensics in connected autonomous vehicles: A review of the state-of-the-art

P Sharma, J Gillanders - IEEe Access, 2022 - ieeexplore.ieee.org
Connected Autonomous Vehicles (CAVs) are transformational technologies that have
demonstrated significant potential for sha** the future of transportation systems. CAV …

Smart locks: Lessons for securing commodity internet of things devices

G Ho, D Leung, P Mishra, A Hosseini, D Song… - Proceedings of the 11th …, 2016 - dl.acm.org
We examine the security of home smart locks: cyber-physical devices that replace traditional
door locks with deadbolts that can be electronically controlled by mobile devices or the lock …

Bias: Bluetooth impersonation attacks

D Antonioli, NO Tippenhauer… - 2020 IEEE symposium …, 2020 - ieeexplore.ieee.org
Bluetooth (BR/EDR) is a pervasive technology for wireless communication used by billions
of devices. The Bluetooth standard includes a legacy authentication procedure and a secure …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

Sok: The long journey of exploiting and defending the legacy of king harald bluetooth

J Wu, R Wu, D Xu, DJ Tian… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Named after the Viking King Harald Bluetooth, Bluetooth is the de facto standard for short-
range wireless communications. The introduction of Bluetooth Low Energy (BLE) and Mesh …

Iot network cybersecurity assessment with the associated random neural network

E Gelenbe, M Nakip - IEEE Access, 2023 - ieeexplore.ieee.org
This paper proposes a method to assess the security of an device, or IP address, IoT
network by simultaneously identifying all the compromised IoT devices and IP addresses. It …

[КНИГА][B] Wireless security and cryptography: specifications and implementations

N Sklavos, M Manninger, X Zhang, O Koufopavlou… - 2017 - taylorfrancis.com
As the use of wireless devices becomes widespread, so does the need for strong and
secure transport protocols. Even with this intensified need for securing systems, using …

A framework for analyzing RFID distance bounding protocols

G Avoine, MA Bingöl, S Kardaş… - Journal of …, 2011 - content.iospress.com
Many distance bounding protocols appropriate for the RFID technology have been proposed
recently. Unfortunately, they are commonly designed without any formal approach, which …

Two practical man-in-the-middle attacks on bluetooth secure simple pairing and countermeasures

K Haataja, P Toivanen - IEEE Transactions on Wireless …, 2010 - ieeexplore.ieee.org
We propose two new Man-In-The-Middle (MITM) attacks on Bluetooth Secure Simple Pairing
(SSP). The attacks are based on the falsification of information sent during the input/output …

Blurtooth: Exploiting cross-transport key derivation in bluetooth classic and bluetooth low energy

D Antonioli, NO Tippenhauer, K Rasmussen… - … of the 2022 ACM on Asia …, 2022 - dl.acm.org
Bluetooth is a pervasive wireless technology specified in an open standard. The standard
defines Bluetooth Classic (BT) for high-throughput wireless services and Bluetooth Low …