Researcher finds huge security flaws in Bluetooth locks, 2016. ,
, Specification of the Bluetooth System, Covered Core Package Version 4.2, Master Table of Contents and Compliance, Bluetooth Special Interest Group, vol.0, 2014.
, Bluetooth 5 quadruples range, doubles speed, increases data broadcasting capacity by 800%, Bluetooth Special Interest Group, 2016.
Dynamic salt generation and placement for secure password storing, International Journal of Computer Science, vol.43, issue.1, p.2016 ,
, Advanced Solutions for Critical Infrastructure Protection: Complying with the North American Electric Reliability Corporation Critical Infrastructure Protection Standards, Entrust, 2012.
Protection privacy of BLE device users, Proceedings of the Twenty-Fifth USENIX Security Symposium, pp.1205-1221, 2016. ,
Technology Corner: Brute Force Password Generation -- Basic Iterative and Recursive Algorithms, Journal of Digital Forensics, Security and Law, vol.6, issue.3, pp.79-85, 2011. ,
DOI : 10.15394/jdfsl.2011.1102
Android, a secure future at last? Engineering and Technology, pp.50-54, 2012. ,
Bluetooth Security Attacks: Comparative Analysis, Attacks and Countermeasures, 2013. ,
DOI : 10.1007/978-3-642-40646-1
Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures, IEEE Transactions on Wireless Communications, vol.9, issue.1, pp.384-392, 2010. ,
DOI : 10.1109/TWC.2010.01.090935
Complete Guide to Security and Privacy Metrics: Measuring Regulatory Compliance, Operational Resilience and ROI, 2007. ,
DOI : 10.1201/9781420013283
Bluetooth Low Energy: The Developer's Handbook, Pearson Education, Upper Saddle River ,
Backdooring the front door: Hacking a " perfectly secure " smart lock, presented at DEF CON 24, 2016. ,
, , 2002.
, NSTAC Report to the President on Secure Government Communications
Violent Python: A Cookbook for Hackers, Forensic Analysts , Penetration Testers and Security Engineers, 2013. ,
Violating Assumptions with Fuzzing, IEEE Security and Privacy Magazine, vol.3, issue.2, pp.58-62, 2005. ,
DOI : 10.1109/MSP.2005.55
, , p.2016
Guide to Bluetooth Security, NIST Special Publication 800-121, Revision 1, National Institute of Standards and Technology, 2012. ,
Internet of Things by the numbers: Markets estimates and forecasts , Forbes, 2014. ,
Sharpening the Stinger: Tuning KillerBee for Critical Infrastructure Warwalking, 2014 IEEE Military Communications Conference, pp.104-109, 2014. ,
DOI : 10.1109/MILCOM.2014.24
Watching for weaknesses in wild WPANs, Proceedings of the IEEE Military Communications Conference, pp.1404-1409, 2013. ,
DOI : 10.1109/milcom.2013.238
Picking Bluetooth Low Energy locks from a quarter mile away, presented at DEF CON 24, 2016. ,
DOI : 10.1007/978-3-319-70395-4_16
Bluetooth: With low energy comes low security, Proceedings of the Seventh USENIX Conference on Offensive Technologies, 2013. ,
Getting Started with Bluetooth Low Energy: Tools and Techniques for Low-Power Networking, O'Reilly Media, 2014. ,