Sok: a systematic literature review of bluetooth security threats and mitigation measures
S Shrestha, E Irby, R Thapa, S Das - International Symposium on …, 2022 - Springer
Bluetooth devices have integrated into our everyday lives such that we see an increase in
wearable technologies. Users of these devices are often unaware of the security …
wearable technologies. Users of these devices are often unaware of the security …
Exploiting bluetooth vulnerabilities in e-health IoT devices
Internet of Things (IoT) is an interconnected network of heterogeneous things through the
Internet. The current and next generation of e-health systems are dependent on IoT devices …
Internet. The current and next generation of e-health systems are dependent on IoT devices …
[PDF][PDF] Bluetooth embedded digital ammeter with Android app data logging
Monitoring current supplies to light emitting diode (LED) luminaires is one of the reliability
tests performed manually. Bluetooth (HC-05) embedded digital ammeter was proposed to …
tests performed manually. Bluetooth (HC-05) embedded digital ammeter was proposed to …
Toward a secure crowdsourced location tracking system
Low-energy Bluetooth devices have become ubiquitous and widely used for different
applications. Among these, Bluetooth trackers are becoming popular as they allow users to …
applications. Among these, Bluetooth trackers are becoming popular as they allow users to …
[PDF][PDF] Analysis of water quality status of Cengklik reservoir based on pollution index, Boyolali Regency, Central Java, Indonesia
F Iraguha, C Adita, A Arsianti - International Journal of Science and …, 2022 - ijsea.com
Anthropogenic activities such as fishing, fish ponds, and domestic trash contribute the most
to the water quality of the Cengklik reservoir. This research aimed to analyze the water …
to the water quality of the Cengklik reservoir. This research aimed to analyze the water …
[PDF][PDF] A short range wireless network: Bluetooth
M Dahiya - International Journal of Advanced Research in …, 2017 - researchgate.net
This paper discusses about the wireless networks, we are using now-a-days. The most
widely used, standard of wireless network nowa-days is Bluetooth. Bluetooth is a standard …
widely used, standard of wireless network nowa-days is Bluetooth. Bluetooth is a standard …
Architecture for Inspecting Bluetooth Traffic in Software-Defined Networks
Software-Defined Networking (SDN) gained popularity in recent years for network
management, network function virtualization (NFV) and its integration in wireless networks …
management, network function virtualization (NFV) and its integration in wireless networks …
[PDF][PDF] MATLAB Implementation of 128-key length SAFER+ Cipher System
MK Mahmood, LS Abdulla, AH Mohsin… - Int. Journal of …, 2017 - researchgate.net
Data security is a major challenge today. To protect data in the Internet or in private networks
many measures exist. The most important security layer is the use of encryption standard to …
many measures exist. The most important security layer is the use of encryption standard to …
Bluetooth Low Energy Devices: Attacks and Mitigations
TVB Sastry, P Amritha - Advances in Electrical and Computer …, 2021 - books.google.com
In wireless communications, Bluetooth technology is a key component. Bluetooth, more
specifically Bluetooth Low Energy (BLE), provides a short-distance wireless communication …
specifically Bluetooth Low Energy (BLE), provides a short-distance wireless communication …
Implementasi Solenoid Dan Sensor Getar Pada Sistem Keamanan Sepeda Menggunakan Modul Bluetooth Dan Gsm Berbasis Mikrokontroler
FA Trisetio, V Suryani… - eProceedings …, 2021 - … .telkomuniversity.ac.id
Perkembangan teknologi mikrokontroller saat ini banyak digunakan di berbagai aspek,
salah satunya adalah sistem keamanan kendaraan sepeda. Penelitian ini menggunakan …
salah satunya adalah sistem keamanan kendaraan sepeda. Penelitian ini menggunakan …