Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey

A Barua, MA Al Alamin, MS Hossain… - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …

Securing Bluetooth Low Energy networking: An overview of security procedures and threats

A Lacava, V Zottola, A Bonaldo, F Cuomo, S Basagni - Computer Networks, 2022 - Elsevier
Abstract Bluetooth Low Energy (BLE) is rapidly becoming the de-facto standard for short-
range wireless communications among resource-constrained wireless devices. Securing …

Protocol-based deep intrusion detection for dos and ddos attacks using unsw-nb15 and bot-iot data-sets

M Zeeshan, Q Riaz, MA Bilal, MK Shahzad… - IEEE …, 2021 - ieeexplore.ieee.org
Since its inception, the Internet of Things (IoT) has witnessed mushroom growth as a
breakthrough technology. In a nutshell, IoT is the integration of devices and data such that …

Machine learning-based IoT-botnet attack detection with sequential architecture

YN Soe, Y Feng, PI Santosa, R Hartanto, K Sakurai - Sensors, 2020 - mdpi.com
With the rapid development and popularization of Internet of Things (IoT) devices, an
increasing number of cyber-attacks are targeting such devices. It was said that most of the …

Towards a lightweight detection system for cyber attacks in the IoT environment using corresponding features

YN Soe, Y Feng, PI Santosa, R Hartanto, K Sakurai - Electronics, 2020 - mdpi.com
The application of a large number of Internet of Things (IoT) devices makes our life more
convenient and industries more efficient. However, it also makes cyber-attacks much easier …

Bluetooth low energy mesh networks: Survey of communication and security protocols

MR Ghori, TC Wan, GC Sodhy - Sensors, 2020 - mdpi.com
Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications
for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are …

[HTML][HTML] Modelling of the energy depletion process and battery depletion attacks for battery-powered internet of things (iot) devices

GS Kuaban, E Gelenbe, T Czachórski, P Czekalski… - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) is transforming almost every industry, including agriculture, food
processing, health care, oil and gas, environmental protection, transportation and logistics …

SUKRY: suricata IDS with enhanced kNN algorithm on raspberry Pi for classifying IoT botnet attacks

I Syamsuddin, OM Barukab - electronics, 2022 - mdpi.com
The focus of this research is the application of the k-Nearest Neighbor algorithm in terms of
classifying botnet attacks in the IoT environment. The kNN algorithm has several advantages …

Implementing lightweight iot-ids on raspberry pi using correlation-based feature selection and its performance evaluation

YN Soe, Y Feng, PI Santosa, R Hartanto… - … : Proceedings of the 33rd …, 2020 - Springer
The application of many IoT devices is making our world more convenient and efficient.
However, it also makes a large number of cyber-attacks possible because most IoT devices …

Rule generation for signature based detection systems of cyber attacks in iot environments

YN Soe, Y Feng, PI Santosa, R Hartanto… - Bulletin of Networking …, 2019 - ww.bncss.org
Many modern attacks are targeting the IoT devices in recent year. Most of IoT attacks are
botnet attacks. Even though there are many detections and preventing systems for cyber …