[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Gottschalk, 2020 - Google Patents

The Security Risks of Bluetooth Wearables: An Open-Source Perspective

Gottschalk, 2020

Document ID
18163112776967847785
Author
Gottschalk J
Publication year

External Links

Snippet

This research paper intended to investigate the Bluetooth standard as it applies to wearable devices, and determine whether the security systems within Bluetooth are sufficient to secure these devices. With the growing market of wearable Bluetooth devices, there is a …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect

Similar Documents

Publication Publication Date Title
Yaacoub et al. Securing internet of medical things systems: Limitations, issues and recommendations
Barua et al. Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey
Abdul-Ghani et al. A comprehensive IoT attacks survey based on a building-blocked reference model
Cäsar et al. A survey on Bluetooth Low Energy security and privacy
Al-Janabi et al. Survey of main challenges (security and privacy) in wireless body area networks for healthcare applications
Wu et al. Access control schemes for implantable medical devices: A survey
Javadi et al. Security and privacy in wireless body area networks for health care applications
Karygiannis et al. Wireless Network Security:.
Ye et al. Security analysis of Internet-of-Things: A case study of august smart lock
Lacava et al. Securing Bluetooth Low Energy networking: An overview of security procedures and threats
Pournaghshband et al. Securing legacy mobile medical devices
Haataja et al. Bluetooth security attacks: comparative analysis, attacks, and countermeasures
Pathania et al. Security issues in wireless body area network
Langone et al. Cybersecurity of wearable devices: An experimental analysis and a vulnerability assessment method
Ellouze et al. Powerless security for cardiac implantable medical devices: Use of wireless identification and sensing platform
Law et al. Kalwen: A new practical and interoperable key management scheme for body sensor networks
Zhang et al. On the (in) security of bluetooth low energy one-way secure connections only mode
Kang Systematic analysis of security implementation for internet of health things in mobile health networks
Hussien et al. Secure and efficient e-health scheme based on the Internet of Things
Hessel et al. LoRaWAN security: an evolvable survey on vulnerabilities, attacks and their systematic mitigation
Agudo et al. A privacy-aware continuous authentication scheme for proximity-based access control
Bikos et al. The future of privacy and trust on the internet of Things (IoT) for healthcare: Concepts, Challenges, and Security Threat Mitigations
Franklin et al. Security analysis of first responder mobile and wearable devices
Noura Efficient and secure cryptographic solutions for medical data
Zendehdel et al. Automated security assessment framework for wearable BLE-enabled health monitoring devices