2022
DOI: 10.1016/j.jksuci.2021.04.003
|View full text |Cite
|
Sign up to set email alerts
|

A technical review of wireless security for the internet of things: Software defined radio perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0
2

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 46 publications
0
6
0
2
Order By: Relevance
“…They were able to decode the keys pressed on the keyboard by the operator. The authors of [26][27][28] discussed the security risks of wireless USB keys because an unencrypted input signal can be intercepted and used to access the attached device.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They were able to decode the keys pressed on the keyboard by the operator. The authors of [26][27][28] discussed the security risks of wireless USB keys because an unencrypted input signal can be intercepted and used to access the attached device.…”
Section: Related Workmentioning
confidence: 99%
“…The problems arise from the way the key manages communication. Wireless USB dongles are susceptible to security risks because the unencrypted input signal can be intercepted and used to gain access to the attached computer [26]. A malicious user can passively and covertly record everything typed on a wireless keyboard from several meters away using an antenna, a wireless dongle, and a few lines of software code [27,28].…”
Section: Wireless Keyboards and Micementioning
confidence: 99%
“…They setup multi-VLAN and it enables efficient and secure data transmission between the campuses, ensuring the overall performance and effectiveness of the network infrastructure. Rugeles uribe et al (2021) [6] Develop a technical review of wireless security for the internet of things. This research discusses the vulnerabilities in wireless technologies that provide connectivity to iot devices and evaluates the use of software defined radio (sdr) for conducting wireless attacks on iot technologies.…”
Section: Literature Reviewmentioning
confidence: 99%
“…El desarrollo del proyecto emplea un objetivo móvil sobre rieles en un espacio cerrado con la finalidad de tener en entorno controlado para la configuración del radar [18]. En [19] se desarrolla una revisión técnica de la seguridad inalámbrica para Internet de las cosas, donde se da enfoque a los ataques a través de dispositivos conectados a internet (Internet of Things, o IoT en inglés) que están aumentando y esto ha expuesto vulnerabilidades en diferentes tipos de dispositivos y redes. Estos ataques pueden afectar a las tecnologías inalámbricas que dan conectividad a IoT y se pueden realizar usando radio definida por software, donde se encuentra que las vulnerabilidades en las capas superiores de IoT (la capa de percepción en particular) son las más comunes.…”
Section: A) Américaunclassified
“…Estos ataques pueden afectar a las tecnologías inalámbricas que dan conectividad a IoT y se pueden realizar usando radio definida por software, donde se encuentra que las vulnerabilidades en las capas superiores de IoT (la capa de percepción en particular) son las más comunes. Los futuros sistemas de ciberseguridad basados en tecnologías SDR pueden tener ventajas significativas, pero es necesario afrontar los desafíos de seguridad de IoT [19].…”
Section: A) Américaunclassified