2020
DOI: 10.6028/nist.ir.8196
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of first responder mobile and wearable devices

Abstract: Certain commercial entities, equipment, or materials may be identified in this document in order to describe an experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by NIST, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose.There may be references in this publication to other publications currently under development by NIST in accordance with its assigned statutory respons… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 8 publications
0
3
0
Order By: Relevance
“…Battery drainage attack occurs when an adversary exploits the resource constraints of a device (ie, mostly a wearable or an implantable one) in order to drain its battery and make it unavailable for the legitimate user 37,38 . For example, the attacker may overrun the IoMT device with a large number of no authorized requests thus preventing it from going to sleep or energy saving mode 20 …”
Section: Generalized Attack Types In Iomt Edge Networkmentioning
confidence: 99%
“…Battery drainage attack occurs when an adversary exploits the resource constraints of a device (ie, mostly a wearable or an implantable one) in order to drain its battery and make it unavailable for the legitimate user 37,38 . For example, the attacker may overrun the IoMT device with a large number of no authorized requests thus preventing it from going to sleep or energy saving mode 20 …”
Section: Generalized Attack Types In Iomt Edge Networkmentioning
confidence: 99%
“…The list of challenges for MWBDs is not limited by the above examples. Any influx of new technologies will introduce new security challenges [50], and new countermeasures should be proposed accordingly. Security is never free and may cause an extra overhead (e.g., exceeding a tight power budget, increasing time delays, or causing extra memory usage, etc.)…”
Section: F Oncoming Challengesmentioning
confidence: 99%
“…The purpose of this section is to present a set of use cases as part of a foundation for understanding the necessary security requirements for next generation mobile passenger ID devices for land and sea border control. To develop these use cases, we relied on NISTIR 8196 "Security Analysis of First Responder Mobile and Wearable Devices", where several cases from reputable public safety organizations were identified, surveyed, and analyzed [4].…”
Section: Use Cases For Next Generation Mobile Passenger Id Devices For Land and Sea Border Controlmentioning
confidence: 99%