Smart-Lock Attack Through Bluetooth Communications Replication

Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/10045/138458
Información del item - Informació de l'item - Item information
Título: Smart-Lock Attack Through Bluetooth Communications Replication
Autor/es: Caballero Gil, Cándido | Alvarez, Rafael | Molina Gil, Jezabel | Hernández Goya, Candelaria
Grupo/s de investigación o GITE: Criptología y Seguridad Computacional
Centro, Departamento o Servicio: Universidad de Alicante. Departamento de Ciencia de la Computación e Inteligencia Artificial
Palabras clave: Smart-lock | Bluetooth | Cybersecurity | Cyber-attack
Fecha de publicación: 21-nov-2022
Editor: Springer, Cham
Cita bibliográfica: Caballero-Gil, C., Álvarez, R., Molina-Gil, J., Hernández-Goya, C. (2023). Smart-Lock Attack Through Bluetooth Communications Replication. In: Bravo, J., Ochoa, S., Favela, J. (eds) Proceedings of the International Conference on Ubiquitous Computing & Ambient Intelligence (UCAmI 2022). UCAmI 2022. Lecture Notes in Networks and Systems, vol 594. Springer, Cham. https://doi.org/10.1007/978-3-031-21333-5_98
Resumen: The rise of smart locks has made them present in many homes and business in a large number of countries. This is due to their user-friendly design and the flexibility they offer. Smart-locks usually offer a convenient and secure way to unlock the door without the need for keys. However, as with any new technology, there are potential security risks that need to be considered. In particular, bluetooth security of smart-locks is very important because a leak can provide unauthorized access. Bluetooth is a wireless technology that allows devices to communicate with each other. It is used in a variety of devices, including smartphones, laptops, and now smart-locks. While Bluetooth offers many benefits, it also poses a security risk if it is not properly secured. To ensure the smart-lock is secure, one of the security factors must be considered is the Bluetooth security. This will ensure that only authorized users can access the home or business. In this work, the security of the Nuki smart-lock through bluetooth communications have been checked.
Patrocinador/es: Research supported by the CDTI (Centre for the Development of Industrial Technology), the Ministry of Economy Industry and Competitiveness, Celtic-Plus EUREKA and the European Regional Development Fund, under Project IMMINENCE C2020/2-2.
URI: http://hdl.handle.net/10045/138458
ISBN: 978-3-031-21332-8 | 978-3-031-21333-5
DOI: 10.1007/978-3-031-21333-5_98
Idioma: eng
Tipo: info:eu-repo/semantics/conferenceObject
Derechos: © The Author(s), under exclusive license to Springer Nature Switzerland AG 2023
Revisión científica: si
Versión del editor: https://doi.org/10.1007/978-3-031-21333-5_98
Aparece en las colecciones:INV - CSC - Comunicaciones a Congresos, Conferencias, etc.

Archivos en este ítem:
Archivos en este ítem:
Archivo Descripción TamañoFormato 
ThumbnailSmart-Lock_Attack_Through_Bluetooth_Communications_Replication.pdfVersión final (acceso restringido)984,94 kBAdobe PDFAbrir    Solicitar una copia
ThumbnailSmart-Lock_Attack_Through_Bluetooth_Communications_Replication-rev.pdfVersión revisada (acceso abierto)767 kBAdobe PDFAbrir Vista previa


Todos los documentos en RUA están protegidos por derechos de autor. Algunos derechos reservados.