Wu et al., 2020 - Google Patents
{BlueShield}: Detecting spoofing attacks in bluetooth low energy networksWu et al., 2020
View PDF- Document ID
- 13604554131086839426
- Author
- Wu J
- Nan Y
- Kumar V
- Payer M
- Xu D
- Publication year
- Publication venue
- 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020)
External Links
Snippet
Many IoT devices are equipped with Bluetooth Low Energy (BLE) to support communication in an energy-efficient manner. Unfortunately, BLE is prone to spoofing attacks where an attacker can impersonate a benign BLE device and feed malicious data to its users …
- AEJIMXVJZFYIHN-UHFFFAOYSA-N copper;dihydrate data:image/svg+xml;base64,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 data:image/svg+xml;base64,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 O.O.[Cu] 0 title description 134
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Wu et al. | {BlueShield}: Detecting spoofing attacks in bluetooth low energy networks | |
| Fragkiadakis et al. | A survey on security threats and detection techniques in cognitive radio networks | |
| US8254847B2 (en) | Distributed wireless communications for tactical network dominance | |
| Kasinathan et al. | An IDS framework for internet of things empowered by 6LoWPAN | |
| Min et al. | Secure cooperative sensing in IEEE 802.22 WRANs using shadow fading correlation | |
| Labraoui et al. | Secure DV‐Hop localization scheme against wormhole attacks in wireless sensor networks | |
| Ramsey et al. | Wireless intrusion detection and device fingerprinting through preamble manipulation | |
| Gordon et al. | A security assessment for consumer wifi drones | |
| Yu et al. | A framework for detecting MAC and IP spoofing attacks with network characteristics | |
| Zhang et al. | Signal emulation attack and defense for smart home IoT | |
| Lovinger et al. | Detection of wireless fake access points | |
| WO2023219641A2 (en) | Systems and methods for detecting microwave pulses | |
| Shen et al. | Electromagnetic fingerprinting of memory heartbeats: System and applications | |
| Kitisriworapan et al. | Client-side rogue access-point detection using a simple walking strategy and round-trip time analysis | |
| Arnold et al. | Catch you cause i can: busting rogue base stations using cellguard and the apple cell location database | |
| US11330438B2 (en) | Active base providing local man-in-the-middle firewall | |
| O’Mahony et al. | Identifying distinct features based on received samples for interference detection in wireless sensor network edge devices | |
| Ghayyad et al. | The flaws of Internet of Things (IoT) intrusion detection and prevention schemes | |
| Chandrashekar et al. | A primary user authentication system for mobile cognitive radio networks | |
| Xu et al. | Effective uav and ground sensor authentication | |
| Vijayan et al. | A conceptual framework of Zigbee wireless sensor networks for safety, reliability and security improvement | |
| Cabaj et al. | Sniffing detection within the network: Revisiting existing and proposing novel approaches | |
| Hussein et al. | Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks | |
| Lalouani et al. | Protocol Switching Mechanism for Countering Radiometric Signature Exploitation | |
| Ramsey | Improved wireless security through physical layer protocol manipulation and radio frequency fingerprinting |