Gottschalk, 2020 - Google Patents
The Security Risks of Bluetooth Wearables: An Open-Source PerspectiveGottschalk, 2020
- Document ID
- 18163112776967847785
- Author
- Gottschalk J
- Publication year
External Links
Snippet
This research paper intended to investigate the Bluetooth standard as it applies to wearable devices, and determine whether the security systems within Bluetooth are sufficient to secure these devices. With the growing market of wearable Bluetooth devices, there is a …
- 238000011160 research 0 abstract description 16
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/83—Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yaacoub et al. | Securing internet of medical things systems: Limitations, issues and recommendations | |
Barua et al. | Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey | |
Abdul-Ghani et al. | A comprehensive IoT attacks survey based on a building-blocked reference model | |
Cäsar et al. | A survey on Bluetooth Low Energy security and privacy | |
Al-Janabi et al. | Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications | |
Wu et al. | Access control schemes for implantable medical devices: A survey | |
Javadi et al. | Security and privacy in wireless body area networks for health care applications | |
Karygiannis et al. | Wireless Network Security:. | |
Ye et al. | Security analysis of Internet-of-Things: A case study of august smart lock | |
Lacava et al. | Securing Bluetooth Low Energy networking: An overview of security procedures and threats | |
Pournaghshband et al. | Securing legacy mobile medical devices | |
Haataja et al. | Bluetooth security attacks: comparative analysis, attacks, and countermeasures | |
Pathania et al. | Security issues in wireless body area network | |
Langone et al. | Cybersecurity of wearable devices: An experimental analysis and a vulnerability assessment method | |
Ellouze et al. | Powerless security for cardiac implantable medical devices: Use of wireless identification and sensing platform | |
Law et al. | Kalwen: A new practical and interoperable key management scheme for body sensor networks | |
Zhang et al. | On the (in) security of bluetooth low energy one-way secure connections only mode | |
Kang | Systematic analysis of security implementation for internet of health things in mobile health networks | |
Hussien et al. | Secure and efficient e-health scheme based on the Internet of Things | |
Hessel et al. | LoRaWAN security: an evolvable survey on vulnerabilities, attacks and their systematic mitigation | |
Agudo et al. | A privacy-aware continuous authentication scheme for proximity-based access control | |
Bikos et al. | The future of privacy and trust on the internet of Things (IoT) for healthcare: Concepts, Challenges, and Security Threat Mitigations | |
Franklin et al. | Security analysis of first responder mobile and wearable devices | |
Noura | Efficient and secure cryptographic solutions for medical data | |
Zendehdel et al. | Automated security assessment framework for wearable BLE-enabled health monitoring devices |