2017
DOI: 10.1016/j.ijcip.2017.03.006
|View full text |Cite
|
Sign up to set email alerts
|

Enabling Bluetooth Low Energy auditing through synchronized tracking of multiple connections

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…First, most of these sniffers can only monitor one connection at a time. Del Arroyo et al [18] proposed an opportunistic algorithm based on a scheduler in the Ubertooth One to monitor multiple connections simultaneously, but the underlying outdated hardware limits this work and may miss some packets depending on the environment. Second, most existing implementations are unstable, partially because of the use of various heuristics unsuitable for some devices (e.g., frequent channel map updates).…”
Section: Related Work 81 State Of the Artmentioning
confidence: 99%
“…First, most of these sniffers can only monitor one connection at a time. Del Arroyo et al [18] proposed an opportunistic algorithm based on a scheduler in the Ubertooth One to monitor multiple connections simultaneously, but the underlying outdated hardware limits this work and may miss some packets depending on the environment. Second, most existing implementations are unstable, partially because of the use of various heuristics unsuitable for some devices (e.g., frequent channel map updates).…”
Section: Related Work 81 State Of the Artmentioning
confidence: 99%
“…As above, many IoT applications require broadcasting for short messages, which can be ful lled by broadcasting as per the Eddystone-UID frame by BLE Beacon. The Eddystone-UID is a good protocol design in all senses except security, the de ned standard does not have any provision for con dentiality and data integrity, and anyone can get the broadcasted messages [25]. To overcome the security-related issues here we have proposed an extension to the Eddystone-UID frame to be used at the application layer of the communications stack.…”
Section: Protocol Designmentioning
confidence: 99%
“…The distributed positioning method does needn't a powerful server for calculation and communication. A mobile platform with weak computing ability can satisfy the requirements of multi-users and real-time indoor positioning [11].…”
Section: Introductionmentioning
confidence: 99%