3 Hits in 8.9 sec

A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks

Georgios Kambourakis, Constantinos Kolias, Dimitrios Geneiatakis, Georgios Karopoulos, Georgios Michail Makrakis, Ioannis Kounelis
2020 Symmetry  
To this end, and on top of the current literature, this work provides a comprehensive, vis-à-vis comparison of the security aspects of the thus far most widespread IoT Wireless Personal Area Network (WPAN  ...  Protocol stacks specifically designed for the Internet of Things (IoT) have become commonplace.  ...  For instance, an attacker can send a Remote AT Command to a connected sensor and force it to join a malicious network in order to capture the traffic between the sensor and the network.  ... 
doi:10.3390/sym12040579 fatcat:3ajcbbciondlrjnv73fwzph5pu

Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey

Arup Barua, Md Abdullah Al Alamin, Md. Shohrab Hossain, Ekram Hossain
2022 IEEE Open Journal of the Communications Society  
network coverage, and data transfer speed.  ...  Bluetooth Low Energy (BLE) has become the de facto communication protocol for the Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption, ease of development, good enough  ...  Numerous survey papers [51] , [54] , [55] refer to the IoT devices' communication medium as a wireless network and discuss the attack vector and various countermeasures.  ... 
doi:10.1109/ojcoms.2022.3149732 fatcat:6cwlchy7avhx7ojjslyoyvsifm

Group-based IDS Collaboration Framework [article]

Rainer Bye, Technische Universität Berlin, Technische Universität Berlin, Sahin Albayrak
However, collaboration needs to be administrated efficiently, and a CIDS raises new exploitation opportunities for adversaries.  ...  Accordingly, we incorporate an anonymity scheme to confront adversarial opportunities and provide a group formation algorithm to select the best fitting groups of collaborators according to a collaboration  ...  Camtepe applied these techniques for key distribution schemes in wireless sensor networks [33] .  ... 
doi:10.14279/depositonce-3764 fatcat:ncscbf5m7vbe5liu4cc5tk63jm