Smart-Lock Attack Through Bluetooth Communications Replication
Por favor, use este identificador para citar o enlazar este ítem:
http://hdl.handle.net/10045/138458
Título: | Smart-Lock Attack Through Bluetooth Communications Replication |
---|---|
Autor/es: | Caballero Gil, Cándido | Alvarez, Rafael | Molina Gil, Jezabel | Hernández Goya, Candelaria |
Grupo/s de investigación o GITE: | Criptología y Seguridad Computacional |
Centro, Departamento o Servicio: | Universidad de Alicante. Departamento de Ciencia de la Computación e Inteligencia Artificial |
Palabras clave: | Smart-lock | Bluetooth | Cybersecurity | Cyber-attack |
Fecha de publicación: | 21-nov-2022 |
Editor: | Springer, Cham |
Cita bibliográfica: | Caballero-Gil, C., Álvarez, R., Molina-Gil, J., Hernández-Goya, C. (2023). Smart-Lock Attack Through Bluetooth Communications Replication. In: Bravo, J., Ochoa, S., Favela, J. (eds) Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022). UCAmI 2022. Lecture Notes in Networks and Systems, vol 594. Springer, Cham. https://doi.org/10.1007/978-3-031-21333-5_98 |
Resumen: | The rise of smart locks has made them present in many homes and business in a large number of countries. This is due to their user-friendly design and the flexibility they offer. Smart-locks usually offer a convenient and secure way to unlock the door without the need for keys. However, as with any new technology, there are potential security risks that need to be considered. In particular, bluetooth security of smart-locks is very important because a leak can provide unauthorized access. Bluetooth is a wireless technology that allows devices to communicate with each other. It is used in a variety of devices, including smartphones, laptops, and now smart-locks. While Bluetooth offers many benefits, it also poses a security risk if it is not properly secured. To ensure the smart-lock is secure, one of the security factors must be considered is the Bluetooth security. This will ensure that only authorized users can access the home or business. In this work, the security of the Nuki smart-lock through bluetooth communications have been checked. |
Patrocinador/es: | Research supported by the CDTI (Centre for the Development of Industrial Technology), the Ministry of Economy Industry and Competitiveness, Celtic-Plus EUREKA and the European Regional Development Fund, under Project IMMINENCE C2020/2-2. |
URI: | http://hdl.handle.net/10045/138458 |
ISBN: | 978-3-031-21332-8 | 978-3-031-21333-5 |
DOI: | 10.1007/978-3-031-21333-5_98 |
Idioma: | eng |
Tipo: | info:eu-repo/semantics/conferenceObject |
Derechos: | © The Author(s), under exclusive license to Springer Nature Switzerland AG 2023 |
Revisión científica: | si |
Versión del editor: | https://doi.org/10.1007/978-3-031-21333-5_98 |
Aparece en las colecciones: | INV - CSC - Comunicaciones a Congresos, Conferencias, etc. |
Archivos en este ítem:
Archivo | Descripción | Tamaño | Formato | |
---|---|---|---|---|
Smart-Lock_Attack_Through_Bluetooth_Communications_Replication.pdf | Versión final (acceso restringido) | 984,94 kB | Adobe PDF | Abrir Solicitar una copia |
Smart-Lock_Attack_Through_Bluetooth_Communications_Replication-rev.pdf | Versión revisada (acceso abierto) | 767 kB | Adobe PDF | Abrir Vista previa |
Todos los documentos en RUA están protegidos por derechos de autor. Algunos derechos reservados.