Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

LTK

biblio

Visible to the public An Overview of Practical Attacks on BLE Based IOT Devices and Their Security

Submitted by grigby1 on Fri, 09/04/2020 - 4:26pm
  • IoT devices
  • BLE
  • security vulnerabilities
  • BLE 4.0
  • BLE 4.1
  • BLE 4.2
  • BLE protocol
  • elliptic-curve diffie-Hellman
  • firmware attacks
  • BLE devices
  • LTK
  • MITM attacks
  • Mobile Applications
  • pairing
  • vulnerabilities
  • Wireless communication
  • Cyber Physical System
  • bluetooth security
  • resilience
  • Cryptography
  • Cryptographic Protocols
  • mobile computing
  • telecommunication security
  • public key cryptography
  • pubcrawl
  • composability
  • Resiliency
  • Internet of Things
  • Human behavior
  • cyber physical systems
  • firmware
  • Microprogramming
  • performance evaluation
  • Bluetooth
  • Image color analysis

Terms of Use  |  ©2023. CPS-VO