On security challenges and open issues in Internet of Things

K Sha, W Wei, TA Yang, Z Wang, W Shi - Future generation computer …, 2018 - Elsevier
Abstract When Internet of Things (IoT) applications become a part of people's daily life,
security issues in IoT have caught significant attention in both academia and industry …

Uncovering privacy leakage in BLE network traffic of wearable fitness trackers

AK Das, PH Pathak, CN Chuah… - Proceedings of the 17th …, 2016 - dl.acm.org
There has been a tremendous increase in popularity and adoption of wearable fitness
trackers. These fitness trackers predominantly use Bluetooth Low Energy (BLE) for …

A test environment for wireless hacking in domestic IoT scenarios

A Muñoz, C Fernández-Gago, R López-Villa - Mobile Networks and …, 2022 - Springer
Security is gaining importance in the daily life of every citizen. The advent of Internet of
Things devices in our lives is changing our conception of being connected through a single …

Practical bluetooth traffic sniffing: Systems and privacy implications

W Albazrqaoe, J Huang, G Xing - Proceedings of the 14th Annual …, 2016 - dl.acm.org
With the prevalence of personal Bluetooth devices, potential breach of user privacy has
been an increasing concern. To date, sniffing Bluetooth traffic has been widely considered …

A practical Bluetooth traffic sniffing system: design, implementation, and countermeasure

W Albazrqaoe, J Huang, G Xing - IEEE/ACM Transactions on …, 2018 - ieeexplore.ieee.org
With the prevalence of personal Bluetooth devices, potential breach of user privacy has
been an increasing concern. To date, sniffing Bluetooth traffic has been widely considered …

Wristspy: Snooping passcodes in mobile payment using wrist-worn wearables

C Wang, J Liu, X Guo, Y Wang… - IEEE INFOCOM 2019 …, 2019 - ieeexplore.ieee.org
Mobile payment has drawn considerable attention due to its convenience of paying via
personal mobile devices at anytime and anywhere, and passcodes (ie, PINs or patterns) are …

Personal PIN leakage from wearable devices

C Wang, X Guo, Y Chen, Y Wang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The proliferation of wearable devices, eg, smartwatches and activity trackers, with
embedded sensors has already shown its great potential on monitoring and inferring human …

Thinking unveiled: An inference and correlation model to attack eeg biometrics

D Shukla, PP Kundu, R Malapati, S Poudel… - … Threats: Research and …, 2020 - dl.acm.org
Very few studies have explored linkages between physiological, such as
electroencephalograph (EEG), and behavioral patterns, such as wrist movements. These …

[HTML][HTML] Security review in internet of things

F Ali, MS Khan, H Akhtar - Internet of Things and Cloud Computing, 2019 - ajtaab.org
In this decade, the exceedingly rising state of the art industry is internet of things where
trillion devices will be connected. IoT is being appraised to transform the concept of …

The impact of internet of things self-security on daily business and business continuity

HE Yılmaz, A Sirel, MF Esen - Research Anthology on Business …, 2022 - igi-global.com
The number of devices operating on IoTs has exceeded billions globally. This chapter aims
to examine the cyber security risks of such systems with widespread use and investigate …