2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS) 2019
DOI: 10.1109/ccoms.2019.8821711
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerabilities in IoT Devices with Software-Defined Radio

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 4 publications
0
1
0
Order By: Relevance
“…running on a machine with Microsoft Windows operating system. A HackRF was also used [50]. This is a software defined radio device that allows to receive, transmit, and manipulate radio signals.…”
Section: Methodsmentioning
confidence: 99%
“…running on a machine with Microsoft Windows operating system. A HackRF was also used [50]. This is a software defined radio device that allows to receive, transmit, and manipulate radio signals.…”
Section: Methodsmentioning
confidence: 99%
“…With the right tools and skillset, enthusiasts can access hacking IoT devices that use RF communication. Hung and Vinh studied vulnerabilities in IoT devices from unknown RF protocols by analyzing the frequency and decoding the RF signal (Hung and Vinh, 2019). After decoding the recorded signal data, they rebroadcasted it to the IoT devices, performing a replay attack.…”
Section: Related Workmentioning
confidence: 99%