Muñoz et al., 2023 - Google Patents
A test environment for wireless hacking in domestic IoT scenariosMuñoz et al., 2023
View HTML- Document ID
- 560752529792499950
- Author
- Muñoz A
- Fernández-Gago C
- López-Villa R
- Publication year
- Publication venue
- Mobile Networks and Applications
External Links
Snippet
Security is gaining importance in the daily life of every citizen. The advent of Internet of Things devices in our lives is changing our conception of being connected through a single device to a multiple connection in which the centre of connection is becoming the devices …
- 238000012360 testing method 0 title description 27
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W76/00—Connection management, e.g. connection set-up, manipulation or release
- H04W76/02—Connection set-up
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Muñoz et al. | A test environment for wireless hacking in domestic IoT scenarios | |
Alladi et al. | Consumer IoT: Security vulnerability case studies and solutions | |
Sun et al. | A survey of iot privacy security: Architecture, technology, challenges, and trends | |
US11336635B2 (en) | Systems and methods for authenticating device through IoT cloud using hardware security module | |
US10552645B2 (en) | Method for secure communications using NFC cryptographic security module | |
Chen et al. | Internet-of-things security and vulnerabilities: Taxonomy, challenges, and practice | |
Hashemi et al. | Internet of Things backdoors: Resource management issues, security challenges, and detection methods | |
US20150215281A1 (en) | Method and Apparatus for Providing Security to Devices | |
Yaseen et al. | Marc: A novel framework for detecting mitm attacks in ehealthcare ble systems | |
Renganathan et al. | Valet attack on privacy: A cybersecurity threat in automotive Bluetooth infotainment systems | |
CN103930895A (en) | Information security system in intelligent mobile environment | |
KR102377045B1 (en) | SYSTEMS AND METHODS FOR AUTHENTICATING IoT DEVICE THROUGH CLOUD USING HARDWARE SECURITY MODULE | |
Yang et al. | Formal-guided fuzz testing: Targeting security assurance from specification to implementation for 5g and beyond | |
Zhao et al. | Securesim: rethinking authentication and access control for sim/esim | |
US12019717B2 (en) | Method for the secure interaction of a user with a mobile terminal and a further entity | |
Anwar et al. | Redesigning secure element access control for NFC enabled Android smartphones using mobile trusted computing | |
Maatallaoui et al. | The impact of radio frequency (RF) attacks on security and privacy: A comprehensive review | |
Che et al. | Blueswat: A lightweight state-aware security framework for bluetooth low energy | |
Jeon et al. | IWTW: A Framework for IoWT Cyber Threat Analysis. | |
Raja et al. | Threat modeling and IoT attack surfaces | |
Cui et al. | Attacks against security context in 5g network | |
Armando et al. | Trusted host-based card emulation | |
Kavitha et al. | Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation | |
CN110266651A (en) | Internet of things equipment and method for internet of things equipment | |
Demblewski | Security frameworks for machine-to-machine devices and networks |