A survey on device fingerprinting approach for resource-constraint IoT devices: comparative study and research challenges

RR Chowdhury, PE Abas - Internet of Things, 2022 - Elsevier
Modernization and technological advancement have made smart and convenient living
environments, including smart houses and smart cities, possible, by combining the Internet …

Handoff all your privacy: A review of apple's bluetooth low energy continuity protocol

J Martin, D Alpuche, K Bodeman, L Brown… - arXiv preprint arXiv …, 2019 - arxiv.org
We investigate Apple's Bluetooth Low Energy (BLE) Continuity protocol, designed to support
interoperability and communication between iOS and macOS devices, and show that the …

[HTML][HTML] Ensuring Security and Privacy in the Internet of Things: Challenges and Solutions

N Mohammad, R Khatoon, SI Nilima, J Akter… - Journal of Computer and …, 2024 - scirp.org
The Internet of Things (IoT) represents a revolutionary paradigm, enabling a vast array of
devices to be ubiquitously interconnected via the Internet, thereby facilitating remote control …

A case study of WiFi sniffing performance evaluation

Y Li, J Barthelemy, S Sun, P Perez, B Moran - IEEE Access, 2020 - ieeexplore.ieee.org
Mobile devices regularly broadcast WiFi probe requests in order to discover available
proximal WiFi access points for connection. A probe request, sent automatically in the active …

Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation

FT Chimuco, JBF Sequeiros, CG Lopes… - International Journal of …, 2023 - Springer
The adoption and popularization of mobile devices, such as smartphones and tablets,
accentuated after the second decade of this century, has been motivated by the growing …

[PDF][PDF] Research Online

VNT Le, B Apopei, K Alameh - Sciences, 2018 - academia.edu
Abstract© The Institution of Engineering and Technology 2019. The modulus switching
technique has been used in some cryptographic applications as well as in cryptanalysis. For …

Edge-based passive crowd monitoring through WiFi Beacons

K Gebru, M Rapelli, R Rusca, C Casetti… - Computer …, 2022 - Elsevier
Tracking people's flows has become crucial, not only for safety and security, but also for
numerous practical business applications and better management of urban spaces, facilities …

[HTML][HTML] Estimating bus passenger volume based on a Wi-Fi scanner survey

A Hidayat, S Terabe, H Yaginuma - … Research Interdisciplinary Perspectives, 2020 - Elsevier
The main objective of this study is to estimate bus passenger volume based on a Wi-Fi
scanner transportation survey. The study proposes a new data cleaning procedure to …

[图书][B] The handbook of privacy studies

B Van der Sloot, A De Groot - 2018 - degruyter.com
It was the beginning of 2010 when I (Bart) first joined the University of Amsterdam as a
privacy researcher. What struck me immediately were two things: how interdisciplinary the …

A low-cost automatic people-counting system at bus stops using Wi-Fi probe requests and deep learning

C Pronello, D Anbarasan, F Spoturno, G Terzolo - Public Transport, 2024 - Springer
Counting people is an important part of people-centric applications, and the increase in the
number of IoT devices has allowed the collection of huge amounts of data to facilitate people …