2020
DOI: 10.1007/978-3-030-58951-6_14
|View full text |Cite
|
Sign up to set email alerts
|

DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

2
1

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…However, researchers [20] have shown that a brief training is sufficient to imitate typing pattern of the target users, even when their typing patterns are only partially known. DEB [8] instruments an office chair with two Bluetooth low-energy beacons. An application running on the target system monitors the signal strength of the received Bluetooth beacons.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…However, researchers [20] have shown that a brief training is sufficient to imitate typing pattern of the target users, even when their typing patterns are only partially known. DEB [8] instruments an office chair with two Bluetooth low-energy beacons. An application running on the target system monitors the signal strength of the received Bluetooth beacons.…”
Section: Related Workmentioning
confidence: 99%
“…The ALS data feed is processed in real-time by a simple application running in the background on the target computer. Since the primary goal of any de-authentication mechanism is to prevent lunchtime attacks that are prevalent at typical workplaces [1], [2], [8], our proposed system is expected to be used in conventional workplace setups. DEAL is absolutely unobtrusive.…”
Section: A System Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Assentication [22] detects user presence through pressure sensors in the chair cushion. Whereas, [10] instruments a chair with BLE beacons to detect whether the user is currently sitting. Facial recognition can be used for CAuth by continuously monitoring faces that appear in front of the camera, while being user-transparent [12], [35], [38].…”
Section: A De-authenticationmentioning
confidence: 99%