Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

Bluetooth devices

biblio

Visible to the public BIAS: Bluetooth Impersonation AttackS

Submitted by grigby1 on Mon, 12/28/2020 - 12:27pm
  • attacks
  • wireless communication pervasive technology
  • slave impersonation attacks
  • secure connection establishment
  • secure authentication procedure
  • mandatory mutual authentication
  • impersonation
  • Bluetooth version
  • Bluetooth standard
  • Bluetooth Impersonation AttackS
  • Bluetooth devices
  • Bluetooth chips
  • BIAS attacks
  • authentication procedure
  • bluetooth security
  • wireless security
  • authorisation
  • mobile radio
  • ubiquitous computing
  • composability
  • standards
  • Protocols
  • Cryptography
  • authentication
  • performance evaluation
  • telecommunication security
  • Resiliency
  • resilience
  • Human behavior
  • pubcrawl
  • Bluetooth
biblio

Visible to the public Extracting the Security Features Implemented in a Bluetooth LE Connection

Submitted by aekwall on Mon, 04/01/2019 - 10:06am
  • Data mining
  • bluetooth security
  • Frontline BPA Low Energy Analyzer
  • Bluetooth special interest group
  • Bluetooth Smart
  • bluetooth low energy
  • Bluetooth LE security
  • Bluetooth LE devices
  • Bluetooth LE connection
  • Bluetooth devices
  • Bluetooth
  • computer network security
  • smart phones
  • composability
  • pubcrawl
  • Human behavior
  • Resiliency
  • feature extraction
  • mobile computing
  • Protocols
  • encryption

Terms of Use  |  ©2023. CPS-VO