Security threats in Bluetooth technology

SS Hassan, SD Bibon, MS Hossain… - Computers & Security, 2018 - Elsevier
Bluetooth allows connecting mobile devices in short range in order to transfer files/videos. It
is now a popular means of short range wireless communication. Although Bluetooth is …

[PDF][PDF] Bluetooth MITM vulnerabilities: a literature review, novel attack scenarios, novel countermeasures, and lessons learned

MA Albahar, K Haataja, P Toivanen - International Journal on …, 2016 - researchgate.net
Bluetooth security has been a growing concern among users and manufacturers of a wide
variety of mobile devices and gadgets. This is because these devices have come to require …

Novel hybrid encryption algorithm based on aes, RSA, and twofish for bluetooth encryption

MA Albahar, O Olawumi, K Haataja, P Toivanen - 2018 - erepo.uef.fi
In this paper, we proposed a novel triple algorithm based on RSA (Rivest-Shamir-Adleman),
AES (Advanced Encryption Standard), and TwoFish in order to further improve the security …

Security threats of social internet of things in the higher education environment

AA Mawgoud, MHN Taha, NEM Khalifa - Toward Social Internet of Things …, 2020 - Springer
Within the trials of the utilization of technology for the society, efforts have proven
advantages of the new wave of rapid-growth change that began and is anticipating to …

Bluetooth low energy devices security testing framework

A Ray, V Raj, M Oriol, A Monot… - 2018 IEEE 11th …, 2018 - ieeexplore.ieee.org
Bluetooth Low Energy (BLE), a low-power wireless protocol, is widely used in industrial
automation for monitoring field devices. Although the BLE standard defines advanced …

Evaluating the impact of malicious spoofing attacks on Bluetooth low energy based occupancy detection systems

W Oliff, A Filippoupolitis… - 2017 IEEE 15th …, 2017 - ieeexplore.ieee.org
Occupancy detection of a building has a wide range of applications. Areas such as
emergency management, home automation and building energy management can benefit …

On the security of the ZigBee light link touchlink commissioning procedure

C Müller, F Armknecht, Z Benenson, P Morgner - 2016 - dl.gi.de
Specifications of security mechanisms often lack explicit descriptions of the envisioned
security goals and the underlying assumptions. This makes it difficult for developers and …

TOWARDS ENHANCING JUST WORKS MODEL IN BLUETOOTH PAIRING.

MA Albahar, K Haataja… - International Journal on …, 2016 - search.ebscohost.com
Bluetooth technology offers great opportunities for a variety of applications and has good
market prospects. However, numerous publications and test results give rise to some …

[HTML][HTML] A security study of Bluetooth-powered robot toy

KM Acharige, OP Albuquerque… - … , Security and Safety, 2021 - oaepublish.com
Aim: A smart toy robot has its intellect with circuits on board. It has a built-in microprocessor,
sensors of one or more types, a mechanical system including moving parts, and some …

[图书][B] Microcontroller and Smart Home Networks

DS Dawoud, P Dawoud - 2022 - taylorfrancis.com
Over recent years industries have faced the problem of how to connect devices to 'speak'to
each other with minimum wiring. Philips Semiconductors faced this problem when they …