A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Building a Privacy-Preserving Smart Camera System
[article]
2022
arXiv
pre-print
We show that the system can support live streaming with a latency of 2s at a frame rate of 10fps and a resolution of 480p. ...
However, the architecture and design of popular commercial systems require users to relinquish control of their data to untrusted third parties, such as service providers (e.g., the cloud). ...
Army Research Laboratory and the U.S. Army Research Office under Grant No. W911NF-19-1-0374. ...
arXiv:2201.09338v1
fatcat:2bn5pnkr5jd3vp7f7yyimzppmi
Building a Privacy-Preserving Smart Camera System
2022
Proceedings on Privacy Enhancing Technologies
We show that the system can support live streaming with a latency of 2 s at a frame rate of 10 fps and a resolution of 480 p. ...
However, the architecture and design of popular commercial systems require users to relinquish control of their data to untrusted third parties, such as service providers (e.g., the cloud). ...
Army Research Laboratory and the U.S. Army Research Office under Grant No. W911NF-19-1-0374. ...
doi:10.2478/popets-2022-0034
fatcat:rwji2maemzfdxlzozq344g5kq4
Bluetooth Security Threats And Solutions: A Survey
2012
International Journal of Distributed and Parallel systems
The security issues of Bluetooth have been an active area of research for the last few years. ...
Bluetooth technology has become an integral part of this modern society. ...
A summary of the other key features of Bluetooth technology has been presented in Table- 1. ...
doi:10.5121/ijdps.2012.3110
fatcat:6g5debq3gffyjay27svyfwu534
A Proposed Safer Plus Security Algorithm Using Fast Walsh Hadamard Transform For Bluetooth Technology
2009
Zenodo
Performance of the algorithms is evaluated based on the data throughput, frequency and security level. ...
The results show that the modified SAFER plus algorithm has enhanced security compared to the existing algorithms. ...
Encryption Mode 3-All traffic is encrypted using an encryption key based on the master link key. ...
doi:10.5281/zenodo.1184206
fatcat:fdvrw62tm5h5jo4qoefkznjfxa
Securing Bluetooth Communication with Hybrid Pairing Protocol
2014
International Journal of Security and Its Applications
To improve the level of security of Bluetooth communication, a hybrid pairing protocol based on Diffie-Hellman Key Exchange protocol, MD5 and Hummingbird-2 is proposed. ...
This hybrid pairing protocol is expected to increase the security of the Bluetooth devices against known attacks, such as man-in-the-middle attack and eavesdropping, by combining these strong yet lightweight ...
To secure the wireless Bluetooth sensor system, Nayar [2] deals with its architectural design. ...
doi:10.14257/ijsia.2014.8.4.19
fatcat:ddtl6iol5rdz3oxki47iuikdqy
Block Data Record-Based Dynamic Encryption Key Generation Method for Security between Devices in Low Power Wireless Communication Environment of IoT
2020
Applied Sciences
This requires the application of dynamic encryption keys that generate keys periodically. ...
For the security of the Internet of Things, the encryption key is important to identify and authenticate devices that are trusted. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/app10217940
fatcat:4gvuyrjlrzfobdqz2d42zvfpjm
Blouetooth Low Energy: A Survey
2017
International Journal of Computer Applications
Bluetooth Low Energy (BLE) is a wireless technology with low power that is designed to be embedded into a number of devices to monitor their applications. ...
This capability will provide developers with a proper solution to enable the technology on billions of devices which are already on the market. ...
architecture, consist of: 1. ...
doi:10.5120/ijca2017913248
fatcat:xpnbrrjk55d5bhkvijv4kdr2je
Protecting File Systems with Transient Authentication
2005
Wireless networks
Key granularity plays an important role in determining performance; assigning encryption keys on a per-directory basis limits the cost of an exposed key while maintaining acceptable overhead. ...
The largest file cache on our hardware can be re-encrypted within five seconds of the user's departure, and restored in just over six seconds after detecting the user's return. ...
Acknowledgements The authors wish to thank Peter Chen, who suggested the recovery time metric, and Peter Honeyman, for many valuable ...
doi:10.1007/s11276-004-4743-z
fatcat:zqkpfvd6rvdttiz36omn5opsna
BluePass: A Mobile Device Assisted Password Manager
2019
EAI Endorsed Transactions on Security and Safety
and a decryption key to the vault in the user computer. ...
To address these security vulnerabilities, we propose BluePass, a password manager that stores the password vault (i.e., the set of all the encrypted site passwords of a user) locally in a mobile device ...
Broken HTTPS or Bluetooth If an attacker compromises the HTTPS communication, it will be able to steal the encryption/decryption key pair (K 1 , K 2 ) of a user. ...
doi:10.4108/eai.10-1-2019.156244
fatcat:cgenwvndavb5liq6su4yf2av7m
Security Vulnerabilities in Bluetooth Technology as Used in IoT
2018
Journal of Sensor and Actuator Networks
Bluetooth technology is a key component of wireless communications. It provides a low-energy and low-cost solution for short-range radio transmissions. ...
Bluetooth, more specifically Bluetooth Low Energy (BLE) has become the predominant technology for connecting IoT (Internet of Things). ...
Bluetooth 1. 1 and, the later improved version of Bluetooth, Bluetooth 1.2 are known as Basic Rate (BR). They allow transmission speeds up to 1 Mbps. ...
doi:10.3390/jsan7030028
fatcat:buiyxwdsrjaa7gyyx4od3amxwy
SECURITY ON IOT: A REVIEW
2020
International journal of electronics engineering and application
Security and Privacy are the key issue for the IoT application and still face some huge challenges. ...
The internet of things (IoT) refers to the interconnection via the internet of computing devices embedded in everyday object enabling them to send and receive data. ...
Some of the key communication technologies include Wi-Fi, RFID, Dedicated Short Range Communication (DSRC), Bluetooth, Bluetooth Low Energy (more recently referred to as Bluetooth Smart), NFC, and Zigbee ...
doi:10.30696/ijeea.viii.ii.2020.40-48
fatcat:wnwmfiiuafbkveqrdp66bpgqba
A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography
2022
Sensors
The four steps are data protection and security through encryption algorithms, steganography, data backup and recovery, and data sharing. ...
It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly. ...
Special thanks to Andreas Constantinou for contributing to the early parts of the research. Finally, thanks to all our peers for providing additional constructive feedback with insightful comments. ...
doi:10.3390/s22031109
pmid:35161853
pmcid:PMC8839104
fatcat:kie3bre67fce3cvjv5gac4jdoq
Attacks and Defenses in Short-Range Wireless Technologies for IoT
2020
IEEE Access
Namely, we consider Wi-Fi, Bluetooth, ZigBee, and RFID wireless communication technologies. ...
The security of IoT infrastructures strongly depends on the security of its wired and wireless infrastructures. ...
The first way (in the high-security level) consists of transmitting the keys, such as the network key, in its encrypted form. ...
doi:10.1109/access.2020.2993553
fatcat:jtcl7llvy5crjaktwmvchlmcxa
FlexiWi-Fi Security Manager Using Freescale Embedded System
2015
2015 2nd International Conference on Information Science and Security (ICISS)
clients using the Freescale embedded system, Infrared and Bluetooth modules. ...
However, the drawback of the personal model implementation is that all access points and client radio NIC on the wireless LAN should use the same encryption key. ...
The IR signal is a Pulse Width Modulated (PWM) square wave with only two patterns to represent the digital levels 0 and 1. ...
doi:10.1109/icissec.2015.7371003
fatcat:ryofnrdcljerjn6sdr4t6u4cmq
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
[chapter]
2005
Lecture Notes in Computer Science
Our best attack finds the original encryption key for two-level E0 using the first 24 bits of 2 23.8 frames and with 2 38 computations. ...
Based on this generalized conditional correlation, a general statistical model is studied for dedicated key-recovery distinguishers. ...
Acknowledgments This work is supported in part by the National Competence Center in Research on Mobile Information and Communication Systems (NCCR-MICS), a center of the Swiss National Science Foundation ...
doi:10.1007/11535218_7
fatcat:sfoutmb5kfdltatbgaj7jlp3ei
« Previous
Showing results 1 — 15 out of 1,856 results