Filters








1,856 Hits in 6.4 sec

Building a Privacy-Preserving Smart Camera System [article]

Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick McDaniel
2022 arXiv   pre-print
We show that the system can support live streaming with a latency of 2s at a frame rate of 10fps and a resolution of 480p.  ...  However, the architecture and design of popular commercial systems require users to relinquish control of their data to untrusted third parties, such as service providers (e.g., the cloud).  ...  Army Research Laboratory and the U.S. Army Research Office under Grant No. W911NF-19-1-0374.  ... 
arXiv:2201.09338v1 fatcat:2bn5pnkr5jd3vp7f7yyimzppmi

Building a Privacy-Preserving Smart Camera System

Yohan Beugin, Quinn Burke, Blaine Hoak, Ryan Sheatsley, Eric Pauley, Gang Tan, Syed Rafiul Hussain, Patrick McDaniel
2022 Proceedings on Privacy Enhancing Technologies  
We show that the system can support live streaming with a latency of 2 s at a frame rate of 10 fps and a resolution of 480 p.  ...  However, the architecture and design of popular commercial systems require users to relinquish control of their data to untrusted third parties, such as service providers (e.g., the cloud).  ...  Army Research Laboratory and the U.S. Army Research Office under Grant No. W911NF-19-1-0374.  ... 
doi:10.2478/popets-2022-0034 fatcat:rwji2maemzfdxlzozq344g5kq4

Bluetooth Security Threats And Solutions: A Survey

Nateq Be Nazir Ibn Minar
2012 International Journal of Distributed and Parallel systems  
The security issues of Bluetooth have been an active area of research for the last few years.  ...  Bluetooth technology has become an integral part of this modern society.  ...  A summary of the other key features of Bluetooth technology has been presented in Table- 1.  ... 
doi:10.5121/ijdps.2012.3110 fatcat:6g5debq3gffyjay27svyfwu534

A Proposed Safer Plus Security Algorithm Using Fast Walsh Hadamard Transform For Bluetooth Technology

Sharmila
2009 Zenodo  
Performance of the algorithms is evaluated based on the data throughput, frequency and security level.  ...  The results show that the modified SAFER plus algorithm has enhanced security compared to the existing algorithms.  ...  Encryption Mode 3-All traffic is encrypted using an encryption key based on the master link key.  ... 
doi:10.5281/zenodo.1184206 fatcat:fdvrw62tm5h5jo4qoefkznjfxa

Securing Bluetooth Communication with Hybrid Pairing Protocol

J. T. Lalis, B. D. Gerardo, Y. Byun
2014 International Journal of Security and Its Applications  
To improve the level of security of Bluetooth communication, a hybrid pairing protocol based on Diffie-Hellman Key Exchange protocol, MD5 and Hummingbird-2 is proposed.  ...  This hybrid pairing protocol is expected to increase the security of the Bluetooth devices against known attacks, such as man-in-the-middle attack and eavesdropping, by combining these strong yet lightweight  ...  To secure the wireless Bluetooth sensor system, Nayar [2] deals with its architectural design.  ... 
doi:10.14257/ijsia.2014.8.4.19 fatcat:ddtl6iol5rdz3oxki47iuikdqy

Block Data Record-Based Dynamic Encryption Key Generation Method for Security between Devices in Low Power Wireless Communication Environment of IoT

Soohwan Cho, Deokyoon Ko, Sooyoung Park
2020 Applied Sciences  
This requires the application of dynamic encryption keys that generate keys periodically.  ...  For the security of the Internet of Things, the encryption key is important to identify and authenticate devices that are trusted.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app10217940 fatcat:4gvuyrjlrzfobdqz2d42zvfpjm

Blouetooth Low Energy: A Survey

Shamsaa Hilal
2017 International Journal of Computer Applications  
Bluetooth Low Energy (BLE) is a wireless technology with low power that is designed to be embedded into a number of devices to monitor their applications.  ...  This capability will provide developers with a proper solution to enable the technology on billions of devices which are already on the market.  ...  architecture, consist of: 1.  ... 
doi:10.5120/ijca2017913248 fatcat:xpnbrrjk55d5bhkvijv4kdr2je

Protecting File Systems with Transient Authentication

Mark D. Corner, Brian D. Noble
2005 Wireless networks  
Key granularity plays an important role in determining performance; assigning encryption keys on a per-directory basis limits the cost of an exposed key while maintaining acceptable overhead.  ...  The largest file cache on our hardware can be re-encrypted within five seconds of the user's departure, and restored in just over six seconds after detecting the user's return.  ...  Acknowledgements The authors wish to thank Peter Chen, who suggested the recovery time metric, and Peter Honeyman, for many valuable  ... 
doi:10.1007/s11276-004-4743-z fatcat:zqkpfvd6rvdttiz36omn5opsna

BluePass: A Mobile Device Assisted Password Manager

Yue Li, Haining Wang, Kun Sun
2019 EAI Endorsed Transactions on Security and Safety  
and a decryption key to the vault in the user computer.  ...  To address these security vulnerabilities, we propose BluePass, a password manager that stores the password vault (i.e., the set of all the encrypted site passwords of a user) locally in a mobile device  ...  Broken HTTPS or Bluetooth If an attacker compromises the HTTPS communication, it will be able to steal the encryption/decryption key pair (K 1 , K 2 ) of a user.  ... 
doi:10.4108/eai.10-1-2019.156244 fatcat:cgenwvndavb5liq6su4yf2av7m

Security Vulnerabilities in Bluetooth Technology as Used in IoT

Angela Lonzetta, Peter Cope, Joseph Campbell, Bassam Mohd, Thaier Hayajneh
2018 Journal of Sensor and Actuator Networks  
Bluetooth technology is a key component of wireless communications. It provides a low-energy and low-cost solution for short-range radio transmissions.  ...  Bluetooth, more specifically Bluetooth Low Energy (BLE) has become the predominant technology for connecting IoT (Internet of Things).  ...  Bluetooth 1. 1 and, the later improved version of Bluetooth, Bluetooth 1.2 are known as Basic Rate (BR). They allow transmission speeds up to 1 Mbps.  ... 
doi:10.3390/jsan7030028 fatcat:buiyxwdsrjaa7gyyx4od3amxwy

SECURITY ON IOT: A REVIEW

Ritesh Kumar Thakur, Rajesh Kumar Tiwari
2020 International journal of electronics engineering and application  
Security and Privacy are the key issue for the IoT application and still face some huge challenges.  ...  The internet of things (IoT) refers to the interconnection via the internet of computing devices embedded in everyday object enabling them to send and receive data.  ...  Some of the key communication technologies include Wi-Fi, RFID, Dedicated Short Range Communication (DSRC), Bluetooth, Bluetooth Low Energy (more recently referred to as Bluetooth Smart), NFC, and Zigbee  ... 
doi:10.30696/ijeea.viii.ii.2020.40-48 fatcat:wnwmfiiuafbkveqrdp66bpgqba

A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography

Rose Adee, Haralambos Mouratidis
2022 Sensors  
The four steps are data protection and security through encryption algorithms, steganography, data backup and recovery, and data sharing.  ...  It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly.  ...  Special thanks to Andreas Constantinou for contributing to the early parts of the research. Finally, thanks to all our peers for providing additional constructive feedback with insightful comments.  ... 
doi:10.3390/s22031109 pmid:35161853 pmcid:PMC8839104 fatcat:kie3bre67fce3cvjv5gac4jdoq

Attacks and Defenses in Short-Range Wireless Technologies for IoT

Karim Lounis, Mohammad Zulkernine
2020 IEEE Access  
Namely, we consider Wi-Fi, Bluetooth, ZigBee, and RFID wireless communication technologies.  ...  The security of IoT infrastructures strongly depends on the security of its wired and wireless infrastructures.  ...  The first way (in the high-security level) consists of transmitting the keys, such as the network key, in its encrypted form.  ... 
doi:10.1109/access.2020.2993553 fatcat:jtcl7llvy5crjaktwmvchlmcxa

FlexiWi-Fi Security Manager Using Freescale Embedded System

Mustafa Kamoona, Mohamed El-Sharkawy
2015 2015 2nd International Conference on Information Science and Security (ICISS)  
clients using the Freescale embedded system, Infrared and Bluetooth modules.  ...  However, the drawback of the personal model implementation is that all access points and client radio NIC on the wireless LAN should use the same encryption key.  ...  The IR signal is a Pulse Width Modulated (PWM) square wave with only two patterns to represent the digital levels 0 and 1.  ... 
doi:10.1109/icissec.2015.7371003 fatcat:ryofnrdcljerjn6sdr4t6u4cmq

The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption [chapter]

Yi Lu, Willi Meier, Serge Vaudenay
2005 Lecture Notes in Computer Science  
Our best attack finds the original encryption key for two-level E0 using the first 24 bits of 2 23.8 frames and with 2 38 computations.  ...  Based on this generalized conditional correlation, a general statistical model is studied for dedicated key-recovery distinguishers.  ...  Acknowledgments This work is supported in part by the National Competence Center in Research on Mobile Information and Communication Systems (NCCR-MICS), a center of the Swiss National Science Foundation  ... 
doi:10.1007/11535218_7 fatcat:sfoutmb5kfdltatbgaj7jlp3ei
« Previous Showing results 1 — 15 out of 1,856 results