310 Hits in 7.2 sec

Location-aware sign-on and key exchange using attribute-based encryption and Bluetooth beacons

Marcos Portnoi, Chien-Chung Shen
2013 2013 IEEE Conference on Communications and Network Security (CNS)  
This work presents a mobile sign-on scheme, which utilizes Bluetooth Low Energy beacons for location awareness and Attribute-Based Encryption for expressive, broadcast-style key exchange.  ...  The effect is a "traveling" sign-on that accompanies the user throughout different locations.  ...  In addition of being location-aware, our scheme employs the expressiveness of Ciphertext-Policy Attribute-Based Encryption (CP-ABE [1] ) to encode access policies that are built on both location and user  ... 
doi:10.1109/cns.2013.6682750 dblp:conf/cns/PortnoiS13a fatcat:7vxlulhosvf7vjppceirw4f5se

Loc-Auth: Location-enabled authentication through attribute-based encryption

Marcos Portnoi, Chien-Chung Shen
2015 2015 International Conference on Computing, Networking and Communications (ICNC)  
We demonstrate our scheme employing Bluetooth Low Energy beacons for location awareness and the expressiveness of Attribute-Based Encryption to capture and leverage the described relationship.  ...  We depict a mobile sign-on scheme that benefits from the dynamic relationship between a user's attributes, the service the user wishes to utilize, and location (where the user is, and what services are  ...  Bluetooth Low-Energy beacons broadcast an encrypted message employing Ciphertext-Policy Attribute-Based Encryption (CP-ABE).  ... 
doi:10.1109/iccnc.2015.7069321 dblp:conf/iccnc/PortnoiS15 fatcat:y5klxc6ujrbw5gq2jn4jrxjvsm


Yan Michalevsky, Suman Nath, Jie Liu
2016 Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking - MobiCom '16  
We use direct peer-to-peer communication over Bluetooth LE, rather than relying on a central server.  ...  One of them is proximity-based discovery for private communities.  ...  Acknowledgments We would like to thank Dan Boneh from Stanford University for advice on pairing-based cryptography, identity-based encryption and related works.  ... 
doi:10.1145/2973750.2973778 dblp:conf/mobicom/MichalevskyNL16 fatcat:fdrdqwr7arelponc25m5egkox4

Security and Privacy Threats for Bluetooth Low Energy in IoT and Wearable Devices: A Comprehensive Survey

Arup Barua, Md Abdullah Al Alamin, Md. Shohrab Hossain, Ekram Hossain
2022 IEEE Open Journal of the Communications Society  
Some segregated works on BLE were performed focusing on various vulnerabilities, such as the insecure implementation of encryption, device authentication, user privacy, etc.  ...  Bluetooth Low Energy (BLE) has become the de facto communication protocol for the Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption, ease of development, good enough  ...  Beacons are also used in location-based news services and smart bookshelves [166] , which monitor a person's book of interest to suggest a proper book.  ... 
doi:10.1109/ojcoms.2022.3149732 fatcat:6cwlchy7avhx7ojjslyoyvsifm

A novel Bluetooth low energy based system for spatial exploration in smart cities

Mehdi Boukhechba, Abdenour Bouzouane, Sébastien Gaboury, Charles Gouin-Vallerand, Sylvain Giroux, Bruno Bouchard
2017 Expert systems with applications  
In this paper, we introduce NomaBlue, a new vision of spatial recognition in smart cities, the proposed system is based on an intelligent nomadic data collection and users' collaboration using smart Bluetooth  ...  the internet, it can operate in any indoor/outdoor area, it doesn't require pre-defined geographic databases and uses a new concept of nomadic data collection and sharing to speed-up the circulating information  ...  The counter is used to protect against a replay attack and is increased on each signed data PDU sent ( Giovanelli et al., 2015 ) .  ... 
doi:10.1016/j.eswa.2017.01.052 fatcat:zw4t3xifhzaojfymlpwpvxrrsm

An active man-in-the-middle attack on bluetooth smart devices

Tal Melamed
2018 International Journal of Safety and Security Engineering  
In addition, after introducing some of the available tools for hacking BLE, a case-study based on their use was presented, which describes a MitM attack between a Bluetooth smart device and its designated  ...  may have on our digital and physical security.  ...  and IoT security (  ... 
doi:10.2495/safe-v8-n2-200-211 fatcat:ua2edimwhrdhnn7qupm2vagona

A Study of the Feasibility of Co-located App Attacks against BLE and a Large-Scale Analysis of the Current Application-Layer Security Landscape [article]

Pallavi Sivakumaran, Jorge Blasco
2019 arXiv   pre-print
Bluetooth Low Energy (BLE) is a fast-growing wireless technology with a large number of potential use cases, particularly in the IoT domain.  ...  Increasingly, these use cases require the storage of sensitive user data or critical device controls on the BLE device, as well as the access of this data by an augmentative mobile application.  ...  key 6 Non-random IV 10 Bad IV used with Cipher 7 Bad key used with Cipher 11 Incomplete operation (dead code) 4 a Description of misuse based on [18, 31] .  ... 
arXiv:1808.03778v3 fatcat:im6dreqotba37b5xxc5n5hyew4

You're where? prove it!

Jacob T. Biehl, Adam J. Lee, Gerry Filby, Matthew Cooper
2015 Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing - UbiComp '15  
and use characteristics.  ...  As technologies like Bluetooth Low Energy (BLE) and Apple's iBeacon protocols begin to see widespread adoption, we will no doubt see a proliferation of indoor location enabled application experiences.  ...  [20] presents Loc-Auth, which is a similar system that used attribute-based encryption based on BLE beacons.  ... 
doi:10.1145/2750858.2804284 dblp:conf/huc/BiehlLFC15 fatcat:j6p4k6xd65f5bfh4t7tc5jhtsa

Review and Critical Analysis of Privacy-Preserving Infection Tracking and Contact Tracing

William J. Buchanan, Muhammad Ali Imran, Masood Ur-Rehman, Lei Zhang, Qammer H. Abbasi, Christos Chrysoulas, David Haynes, Nikolaos Pitropakis, Pavlos Papadopoulos
2020 Frontiers in Communications and Networks  
A comprehensive review on the key enabling methods used to realize the infrastructure around these infection tracking and contact tracing methods is also presented, and recommendations are made for the  ...  The outbreak of viruses have necessitated contact tracing and infection tracking methods. Despite various efforts, there is currently no standard scheme for the tracing and tracking.  ...  ACKNOWLEDGMENTS The authors also acknowledge inputs and discussions from the following colleagues: Dr. Ahmed Zoha, Dr. Yusuf Sambo, Dr. Shuja Ansari, and Dr. Kia Dashtipour.  ... 
doi:10.3389/frcmn.2020.583376 fatcat:it66veilondt3n33mctfznkxsq

A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks

Georgios Kambourakis, Constantinos Kolias, Dimitrios Geneiatakis, Georgios Karopoulos, Georgios Michail Makrakis, Ioannis Kounelis
2020 Symmetry  
To this end, and on top of the current literature, this work provides a comprehensive, vis-à-vis comparison of the security aspects of the thus far most widespread IoT Wireless Personal Area Network (WPAN  ...  numerous applications, ranging from healthcare, smart homes, and cities, to intelligent transportation systems and industrial automation.  ...  -bit key used for signing the traffic are sent.  ... 
doi:10.3390/sym12040579 fatcat:3ajcbbciondlrjnv73fwzph5pu

A Dynamic Light-Weight Symmetric Encryption Algorithm for Secure Data Transmission via BLE Beacons

Sam Banani, Surapa Thiemjarus, Kitti Wongthavarawat, Nattapong Ounanong
2021 Journal of Sensor and Actuator Networks  
The algorithm uses a unique temporal encryption key to encrypt each transmitting packet with a simple function such as XOR.  ...  The proposed DLS encryption algorithm is suitable for implementation at the application layer, is light and energy efficient, reduces/removes the need for secret key exchange between sensor nodes and the  ...  Growing Eddystone with Ephemeral Identifiers: A Privacy Aware & Secure Open Beacon Format.  ... 
doi:10.3390/jsan11010002 fatcat:xnybx5fwcvherb7gm5j7u3u7h4


Cory Cornelius, Apu Kapadia, David Kotz, Dan Peebles, Minho Shin, Nikos Triandopoulos
2008 Proceeding of the 6th international conference on Mobile systems, applications, and services - MobiSys '08  
We describe AnonySense, a privacy-aware architecture for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices.  ...  Personal mobile devices are increasingly equipped with the capability to sense the physical world (through cameras, microphones, and accelerometers, for example) and the network world (with Wi-Fi and Bluetooth  ...  We thank the anonymous reviewers, the Metrosense team at Dartmouth College, Patrick Tsang, Vijay Bhuse, and our shepherd Urs Hengartner, for their helpful comments.  ... 
doi:10.1145/1378600.1378624 dblp:conf/mobisys/CorneliusKKPST08 fatcat:afmhtrzvxnel7fepfjmxvo7doq

Secure Content Centric Mobile Network

Mooi Choo Chuah, Xiong Xiong
2011 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011  
Users can exchange information using peer to peer mode without having to rely on cellular data services.  ...  Rapid advancements of wireless technologies allow users to access real-time data, and stay connected with friends and business while they are on the move.  ...  This work was supported in part by US NSF under grant CNS-1049845.  ... 
doi:10.1109/glocom.2011.6134268 dblp:conf/globecom/ChuahX11 fatcat:syqd7gkxzbg67byfm2lpndhpoq

SDDR: Light-Weight, Secure Mobile Encounters

Matthew Lentz, Viktor Erdélyi, Paarijaat Aditya, Elaine Shi, Peter Druschel, Bobby Bhattacharjee
2014 USENIX Security Symposium  
We formally prove the correctness of SDDR, present a prototype implementation over Bluetooth, and show how existing frameworks, such as Haggle, can directly use SDDR.  ...  without re-keying their entire friend set).  ...  Acknowledgments We thank the anonymous reviewers and Jianqing Zhang for their helpful comments, as well as the Max Planck Society.  ... 
dblp:conf/uss/LentzEASDB14 fatcat:dpq5ii3gird7tmuku2z43qcs5e

Providing Security Services in a Resource Discovery System

Juan Vera Del Campo, Josep Pegueroles, Miguel Soriano
2007 Journal of Networks  
and ubiquitous solution.  ...  Despite the fact that many service and resource discovery protocols exist, they are limited to a concrete network technology and most of them do not face mobility and security requirements for a global  ...  Two methods for this discovering are provided, one based on the received beacons and another one based on a previously known MSD.  ... 
doi:10.4304/jnw.2.1.48-59 fatcat:esy4dmxieja6tevz4wg67z2g6i
« Previous Showing results 1 — 15 out of 310 results