Sok: a systematic literature review of bluetooth security threats and mitigation measures
S Shrestha, E Irby, R Thapa, S Das - International Symposium on …, 2022 - Springer
Bluetooth devices have integrated into our everyday lives such that we see an increase in
wearable technologies. Users of these devices are often unaware of the security …
wearable technologies. Users of these devices are often unaware of the security …
[PDF][PDF] Emerging technology IoT and OT: overview, security threats, attacks and countermeasures
A Srivastava, A Agarwal - IJERT, 2021 - researchgate.net
Things (IoT) and Operational Technology (OT) with an emphasis on major security
challenges and attacks faced by these technologies. With increased deployment of IoT and …
challenges and attacks faced by these technologies. With increased deployment of IoT and …
Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy
The number of Internet of Things (IoT) devices has increased dramatically in recent years,
and Bluetooth technology is critical for communication between IoT devices. It is possible to …
and Bluetooth technology is critical for communication between IoT devices. It is possible to …
Comprehensive Analysis Of Cyber-Attack Techniques And Vulnerabilities In Communication Channels Of Embedded Systems
SA Drăguşin, N Bizon… - 2024 16th International …, 2024 - ieeexplore.ieee.org
The paper presents an exhaustive analysis of security in embedded systems, with a focus on
identifying and managing vulnerabilities in communication channels. The introductory …
identifying and managing vulnerabilities in communication channels. The introductory …
BTFuzz: Accurately Fuzzing Bluetooth Host with a Simulated Non-compliant Controller
J Lei, Y Wang, X Zhou, K Yan - 2022 IEEE 4th International …, 2022 - ieeexplore.ieee.org
Bluetooth is widely used in the modern electronic devices such as personal computers,
smart phones, various smart wears and smart home devices. The widespread use of …
smart phones, various smart wears and smart home devices. The widespread use of …
A review on evolving technology of IoT and OT: Security threats, attacks, and defenses
Operational technology (OT) uses hardware and software to monitor, control, and/or detect
changes in industrial assets, processes, and events.“Internet of Things”(IoT) are actual …
changes in industrial assets, processes, and events.“Internet of Things”(IoT) are actual …
[PDF][PDF] Security Threats for Short Range Communication Wireless Network on IoT Devices
K Ujjawal, SK Garg, A Ali, DK Singh - NeuroQuantology, 2022 - researchgate.net
The Internet of Things (IoT) is becoming an advanced technology that is part of the daily
activities of human life. The number of IoT devices is spending is predicted toincrease $1 …
activities of human life. The number of IoT devices is spending is predicted toincrease $1 …
A Flow For Bluetooth Data Secure Transmission Process based on Private Algorithm and National Secret Algorithm
J Zhao, X Xi, H Wang, T Yan, J Liu - Proceedings of the 2024 9th …, 2024 - dl.acm.org
Bluetooth technology as a common short-distance wireless communication technology,
increasingly used in industrial union scene data transmission between devices, but because …
increasingly used in industrial union scene data transmission between devices, but because …
Approach for GDPR compliant detection of COVID-19 infection chains
L Tajan, D Westhoff - arXiv preprint arXiv:2007.08248, 2020 - arxiv.org
While prospect of tracking mobile devices' users is widely discussed all over European
countries to counteract COVID-19 propagation, we propose a Bloom filter based …
countries to counteract COVID-19 propagation, we propose a Bloom filter based …
[PDF][PDF] Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy. Information 2023, 14, 525
The number of Internet of Things (IoT) devices has increased dramatically in recent years,
and Bluetooth technology is critical for communication between IoT devices. It is possible to …
and Bluetooth technology is critical for communication between IoT devices. It is possible to …