A new frontier for IoT security emerging from three decades of key generation relying on wireless channels

J Zhang, G Li, A Marshall, A Hu, L Hanzo - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) is a transformative technology, which is revolutionizing our
everyday life by connecting everyone and everything together. The massive number of …

[PDF][PDF] SoK: The Long Journey of Exploiting and Defending the Legacy of King Harald Bluetooth

J Wu, R Wu, D Xu, D Tian… - 2024 IEEE Symposium on …, 2023 - oaklandsok.github.io
Bluetooth is the de facto standard for short-range wireless communications. The introduction
of Bluetooth Low Energy (BLE) and Mesh protocols has further paved the way for its …

Clock around the clock: Time-based device fingerprinting

I Sanchez-Rola, I Santos, D Balzarotti - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Physical device fingerprinting exploits hardware features to uniquely identify a machine.
This technique has been used for authentication, license binding, or attackers identification …

BLUFFS: Bluetooth forward and future secrecy attacks and defenses

D Antonioli - Proceedings of the 2023 ACM SIGSAC Conference on …, 2023 - dl.acm.org
Bluetooth is a pervasive technology for wireless communication. Billions of devices use it in
sensitive applications and to exchange private data. The security of Bluetooth depends on …

Deep learning based RF fingerprint identification with channel effects mitigation

H Fu, L Peng, M Liu, A Hu - IEEE Open Journal of the …, 2023 - ieeexplore.ieee.org
The radio frequency fingerprint (RFF)-based device identification is a promising physical
layer authentication technique. However, the wireless channel significantly affects the RFF …

Bf-iot: Securing the iot networks via fingerprinting-based device authentication

T Gu, P Mohapatra - … international conference on mobile ad hoc …, 2018 - ieeexplore.ieee.org
Bluetooth low energy (BLE) based devices are already deployed in massive quantity as
Internet-of-things (IoT) becomes prominent in the last two decades. In order to lower the …

Hold the door! fingerprinting your car key to prevent keyless entry car theft

K Joo, W Choi, DH Lee - arXiv preprint arXiv:2003.13251, 2020 - arxiv.org
Recently, the traditional way to unlock car doors has been replaced with a keyless entry
system which proves more convenient for automobile owners. When a driver with a key fob …

Practical bluetooth traffic sniffing: Systems and privacy implications

W Albazrqaoe, J Huang, G Xing - Proceedings of the 14th Annual …, 2016 - dl.acm.org
With the prevalence of personal Bluetooth devices, potential breach of user privacy has
been an increasing concern. To date, sniffing Bluetooth traffic has been widely considered …

Every byte matters: Traffic analysis of bluetooth wearable devices

L Barman, A Dumur, A Pyrgelis… - Proceedings of the ACM on …, 2021 - dl.acm.org
Wearable devices such as smartwatches, fitness trackers, and blood-pressure monitors
process, store, and communicate sensitive and personal information related to the health …

P2-loc: A person-2-person indoor localization system in on-demand delivery

Y Ding, D Jiang, Y Yang, Y Liu, T He… - Proceedings of the ACM …, 2022 - dl.acm.org
On-demand delivery is a fast developing business where gig couriers deliver online orders
within a short time from merchants to customers. Couriers' accurate indoor locations play an …