2019 International Conference on Information Science and Communications Technologies (ICISCT) 2019
DOI: 10.1109/icisct47635.2019.9012037
|View full text |Cite
|
Sign up to set email alerts
|

Review of Analysis on IoT Components, Devices and Layers Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…Bluejacking: This is the use of Bluetooth for sending unsolicited messages to other enabled devices. This attack exploits the Object Exchange (OBEX) protocol which is used by Bluetooth-enabled devices for exchanging data and commands [35].…”
Section: Security Threats and Countermeasuresmentioning
confidence: 99%
See 1 more Smart Citation
“…Bluejacking: This is the use of Bluetooth for sending unsolicited messages to other enabled devices. This attack exploits the Object Exchange (OBEX) protocol which is used by Bluetooth-enabled devices for exchanging data and commands [35].…”
Section: Security Threats and Countermeasuresmentioning
confidence: 99%
“…Some other attacks are dedicated to specific protocols, such as attacks against Bluetooth that are defined as follows: Bluejacking: This is the use of Bluetooth for sending unsolicited messages to other enabled devices. This attack exploits the Object Exchange (OBEX) protocol which is used by Bluetooth-enabled devices for exchanging data and commands [ 35 ]. Bluebugging: This is an attack where the attacker exploits devices by manipulating the devices into compromising its own security, leading to unauthorized access of the device.…”
Section: Network and Protocol Layermentioning
confidence: 99%