2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET) 2017
DOI: 10.1109/wispnet.2017.8300139
|View full text |Cite
|
Sign up to set email alerts
|

Smart bluetooth low energy security system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 5 publications
0
3
0
1
Order By: Relevance
“…Power consumption analysis of Bluetooth Low Energy product is presented in the research work in [26]. A security system design using BLE is presented in [27]. Authors have presented experimental characterization of low power device for IoT applications in [28].…”
Section: Cypress Psoc4 Blementioning
confidence: 99%
“…Power consumption analysis of Bluetooth Low Energy product is presented in the research work in [26]. A security system design using BLE is presented in [27]. Authors have presented experimental characterization of low power device for IoT applications in [28].…”
Section: Cypress Psoc4 Blementioning
confidence: 99%
“…The smartphone application starts with communication through an Arduino Bluetooth module to authorize access. [24] have created a system that uses Bluetooth low energy, aiming the accessibility of people who somehow can not open a door using conventional means. The work cited the use of embedded components similar to those used in this project.…”
Section: Embedded Mobile System For Access Controlmentioning
confidence: 99%
“…Sendo composta de 18 vulnerabilidade, essa ferramenta permite que atacantes consigam causar travamentos, deadlocks e estouros de buffer ou em alguns casos ignorar algumas medidas de seguranc ¸a dos dispositivos. Esses produtos potencialmente afetados pelo Sweyntooth atuam em diferentes áreas como Smart-Homes [Prakash et al 2017], logística [Faragher and Harle 2015] e saúde [Zegeye 2015], transportando dados sensíveis de seus usuários. A seguranc ¸a dos dispositivos BLE é de suma importância para que a adoc ¸ão das aplicac ¸ões IoT seja feita sem comprometer a privacidade e até mesmo a saúde dos usuários, assim, esse trabalho visa demonstrar experimentalmente falhas de seguranc ¸a em dispositivos reais do mercado usando o Sweyntooth.…”
Section: Introduc ¸ãOunclassified