Progressive researches on IoT security: An exhaustive analysis from the perspective of protocols, vulnerabilities, and preemptive architectonics

M Mahbub - Journal of Network and Computer Applications, 2020 - Elsevier
The IoT is the upcoming one of the major networking technologies. Using the IoT, different
items or devices can be allowed to continuously generate, obtain, and exchange …

IoT-Cognizant cloud-assisted energy efficient embedded system for indoor intelligent lighting, air quality monitoring, and ventilation

M Mahbub, MM Hossain, MSA Gazi - Internet of things, 2020 - Elsevier
Pervasive monitoring, delivered through the innovations of wireless sensor systems,
disperses across numerous areas of modern living. This enables environmental parameters …

Sok: a systematic literature review of bluetooth security threats and mitigation measures

S Shrestha, E Irby, R Thapa, S Das - International Symposium on …, 2022 - Springer
Bluetooth devices have integrated into our everyday lives such that we see an increase in
wearable technologies. Users of these devices are often unaware of the security …

A perspective on passive human sensing with bluetooth

G Iannizzotto, M Milici, A Nucita, L Lo Bello - Sensors, 2022 - mdpi.com
Passive human sensing approaches based on the analysis of the radio signals emitted by
the most common wireless communication technologies have been steadily gaining …

Exploiting bluetooth vulnerabilities in e-health IoT devices

M Zubair, D Unal, A Al-Ali, A Shikfa - Proceedings of the 3rd international …, 2019 - dl.acm.org
Internet of Things (IoT) is an interconnected network of heterogeneous things through the
Internet. The current and next generation of e-health systems are dependent on IoT devices …

Every byte matters: Traffic analysis of bluetooth wearable devices

L Barman, A Dumur, A Pyrgelis… - Proceedings of the ACM on …, 2021 - dl.acm.org
Wearable devices such as smartwatches, fitness trackers, and blood-pressure monitors
process, store, and communicate sensitive and personal information related to the health …

Integrated machine learning techniques for preserving privacy in Internet of Things (IoT) systems

S Kakandwar, B Bhushan, A Kumar - … solutions for the security of Iot-based …, 2023 - Elsevier
The advances in human-driven entities has resulted in a huge amount of smart
technologies, such as smart healthcare, smart offices, smart classrooms, and various others …

配电网用户侧异构电力物联设备安全研究综述及展望.

严康, 陆艺丹, 于宗超, 覃芳璐… - … /Dianli Zidonghua Shebei, 2023 - search.ebscohost.com
随着配电网用户侧异构电力物联设备(简称为“配电网用户侧物联设备”) 接入电力系统,
电力系统的安全防护边界变得日益模糊, 使得基于物理隔离装置的安全防护体系无法成为保护 …

An Automated Real‐Time Localization System in Highway and Tunnel Using UWB DL‐TDoA Technology

L Wen, J Han, L Song, Q Zhang, K Li… - Wireless …, 2020 - Wiley Online Library
There exists an electromagnetic shielding effect on radio signals in a tunnel, which results in
no satellite positioning signal in the tunnel scenario. Moreover, because vehicles always …

BrokenStrokes: on the (in) security of wireless keyboards

G Oligeri, S Sciancalepore, S Raponi… - Proceedings of the 13th …, 2020 - dl.acm.org
Wireless devices resorting to event-triggered communications have been proved to suffer
critical privacy issues, due to the intrinsic leakage associated with radio-frequency (RF) …