[go: up one dir, main page]

Muñoz et al., 2023 - Google Patents

A test environment for wireless hacking in domestic IoT scenarios

Muñoz et al., 2023

View HTML
Document ID
560752529792499950
Author
Muñoz A
Fernández-Gago C
López-Villa R
Publication year
Publication venue
Mobile Networks and Applications

External Links

Snippet

Security is gaining importance in the daily life of every citizen. The advent of Internet of Things devices in our lives is changing our conception of being connected through a single device to a multiple connection in which the centre of connection is becoming the devices …
Continue reading at link.springer.com (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W76/00Connection management, e.g. connection set-up, manipulation or release
    • H04W76/02Connection set-up

Similar Documents

Publication Publication Date Title
Muñoz et al. A test environment for wireless hacking in domestic IoT scenarios
Alladi et al. Consumer IoT: Security vulnerability case studies and solutions
Sun et al. A survey of iot privacy security: Architecture, technology, challenges, and trends
US11336635B2 (en) Systems and methods for authenticating device through IoT cloud using hardware security module
US10552645B2 (en) Method for secure communications using NFC cryptographic security module
Chen et al. Internet-of-things security and vulnerabilities: Taxonomy, challenges, and practice
Hashemi et al. Internet of Things backdoors: Resource management issues, security challenges, and detection methods
US20150215281A1 (en) Method and Apparatus for Providing Security to Devices
Yaseen et al. Marc: A novel framework for detecting mitm attacks in ehealthcare ble systems
Renganathan et al. Valet attack on privacy: A cybersecurity threat in automotive Bluetooth infotainment systems
CN103930895A (en) Information security system in intelligent mobile environment
KR102377045B1 (en) SYSTEMS AND METHODS FOR AUTHENTICATING IoT DEVICE THROUGH CLOUD USING HARDWARE SECURITY MODULE
Yang et al. Formal-guided fuzz testing: Targeting security assurance from specification to implementation for 5g and beyond
Zhao et al. Securesim: rethinking authentication and access control for sim/esim
US12019717B2 (en) Method for the secure interaction of a user with a mobile terminal and a further entity
Anwar et al. Redesigning secure element access control for NFC enabled Android smartphones using mobile trusted computing
Maatallaoui et al. The impact of radio frequency (RF) attacks on security and privacy: A comprehensive review
Che et al. Blueswat: A lightweight state-aware security framework for bluetooth low energy
Jeon et al. IWTW: A Framework for IoWT Cyber Threat Analysis.
Raja et al. Threat modeling and IoT attack surfaces
Cui et al. Attacks against security context in 5g network
Armando et al. Trusted host-based card emulation
Kavitha et al. Secure Communication in Internet of Things: Emerging Technologies, Challenges, and Mitigation
CN110266651A (en) Internet of things equipment and method for internet of things equipment
Demblewski Security frameworks for machine-to-machine devices and networks