Secure-by-construction synthesis of cyber-physical systems
Correct-by-construction synthesis is a cornerstone of the confluence of formal methods and
control theory towards designing safety-critical systems. Instead of following the time-tested …
control theory towards designing safety-critical systems. Instead of following the time-tested …
Privacy leakage of LoRaWAN smart parking occupancy sensors
Abstract Development of smart cities is enabled by its core concepts of smart and
sustainable mobility, where Low Power Wide Area Network (LPWAN) such as Long Range …
sustainable mobility, where Low Power Wide Area Network (LPWAN) such as Long Range …
LoRaWAN security: an evolvable survey on vulnerabilities, attacks and their systematic mitigation
The changing vulnerability and threat landscape constantly challenge the security of
wireless communication standards and protocols. For the Internet of Things (IoT), LoRaWAN …
wireless communication standards and protocols. For the Internet of Things (IoT), LoRaWAN …
Insecurity of operational cellular IoT service: new vulnerabilities, attacks, and countermeasures
More than 150 cellular networks worldwide have rolled out massive IoT services such as
smart metering and environmental monitoring. Such cellular IoT services share the existing …
smart metering and environmental monitoring. Such cellular IoT services share the existing …
Zleaks: Passive inference attacks on Zigbee based smart homes
Zigbee is an energy-efficient wireless IoT protocol that is increasingly being deployed in
smart home settings. In this work, we analyze the privacy guarantees of Zigbee protocol …
smart home settings. In this work, we analyze the privacy guarantees of Zigbee protocol …
Privacy attack on IoT: a systematic literature review
Internet of Things (IoT) is a technology that is a daily necessity for humans. Unfortunately, so
far, the IoT still disables privacy for various reasons. This circumstance has intrigued many …
far, the IoT still disables privacy for various reasons. This circumstance has intrigued many …
Discovery privacy threats via device de-anonymization in LoRaWAN
Abstract LoRaWAN (Long Range WAN) is one of the well-known emerging technologies for
the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their …
the Internet of Things (IoT). Many IoT applications involve simple devices that transmit their …
Privacy-preserving pseudonyms for LoRaWAN
LoRaWAN, a widely deployed LPWAN protocol, raises privacy concerns due to metadata
exposure, particularly concerning the exploitation of stable device identifiers. For the first …
exposure, particularly concerning the exploitation of stable device identifiers. For the first …
Protecting adaptive sampling from information leakage on low-power sensors
T Kannan, H Hoffmann - Proceedings of the 27th ACM International …, 2022 - dl.acm.org
Adaptive sampling is a powerful family of algorithms for managing energy consumption on
low-power sensors. These algorithms use captured measurements to control the sensor's …
low-power sensors. These algorithms use captured measurements to control the sensor's …
Device re-identification in LoRaWAN through messages linkage
In LoRaWAN networks, devices are identified by two identifiers: a globally unique and stable
one called DevEUI, and an ephemeral and randomly assigned pseudonym called DevAddr …
one called DevEUI, and an ephemeral and randomly assigned pseudonym called DevAddr …