Survey on enterprise Internet-of-Things systems (E-IoT): A security perspective

LP Rondon, L Babun, A Aris, K Akkaya, AS Uluagac - Ad Hoc Networks, 2022 - Elsevier
As technology becomes more widely available, millions of users worldwide have installed
some form of smart device in their homes or workplaces. These devices are often off-the …

Fake it till you make it: Enhancing security of bluetooth secure connections via deferrable authentication

M Fischlin, O Sanina - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
The Bluetooth protocol for wireless connection between devices comes with several security
measures to protect confidentiality and integrity of data. At the heart of these security …

Low entropy key negotiation attacks on Bluetooth and Bluetooth low energy

D Antonioli, NO Tippenhauer… - Cryptology ePrint …, 2019 - eprint.iacr.org
The specification of Bluetooth and Bluetooth Low Energy includes dedicated encryption key
negotiation protocols used by two parties to agree on the entropy of encryption keys. In this …

Novel Attacks and Defenses for Enterprise Internet-of-Things (E-IoT) Systems

LC Puche Rondon - 2021 - digitalcommons.fiu.edu
This doctoral dissertation expands upon the field of Enterprise Internet-of-Things (E-IoT)
systems, one of the most ubiquitous and under-researched fields of smart systems. E-IoT …

Aggregator to connect in-body sensors to the health record system

P Gomes Freire - 2021 - diva-portal.org
Nowadays an increasing number of people are relying on Implanted Medical Devices-IMD
for the most diverse types of medical procedures. IMDs can be used for many different …