5 research outputs found

    Bluetooth command and control channel

    Get PDF
    Bluetooth is popular technology for short-range communications and is incorporated in mobile devices such as smartphones, tablet computers and laptops. Vulnerabilities associated with Bluetooth technology led to improved security measures surrounding Bluetooth connections. Besides the improvement in security features, Bluetooth technology is still plagued by vulnerability exploits. This paper explores the development of a physical Bluetooth C&C channel, moving beyond previous research that mostly relied on simulations. In order to develop a physical channel, certain requirements must be fulfilled and specific aspects regarding Bluetooth technology must be taken into consideration. To measure performance, the newly designed Bluetooth C&C channel is executed in a controlled environment using the Android operating system as a development platform. The results show that a physical Bluetooth C&C channel is indeed possible and the paper concludes by identifying potential strengths and weaknesses of the new channel.http://www.elsevier.com/locate/cosehb2016Computer Scienc

    Assessment of security vulnerabilities in wearable devices

    Get PDF
    Wearable devices have proliferated in usage and human experience, and they provide convenience for personal information requirements. These devices are both sensory and immersive for the diverse global network that is generally termed the Internet of things (IoT). The immediacy of the two-way communication created in the IoT has made vulnerable human behaviour and raised debate around information ownership and privacy expectations. The legitimacy of ownership of information and its reuse are prevalent problems. In this research, we tested four wearable devices that share 44% of the current market, for security vulnerabilities. We found serious weaknesses that could result in the unplanned disclosure of information and recommend further research into users expectations for safety

    Using tablet devices to control complex home appliances

    Get PDF
    Internet of things has made connected devices and appliances widely available and tablet devices are common household items. This study focuses on technical user interface design challenges and requirements for user interface design of controlling complex home appliances with tablet devices. There is a literature review about available controlling technologies and usability heuristics related to tablet and mobile devices. An Android test application was created and tested with four test users to find out how well those heuristics work and are covered. That application was tested against the regular user interface of a dishwasher and task completion times and errors were noted down. Test users were asked to answer a questionnaire regarding the heuristics and how well the implementation performed. Tablet devices should be evaluated using regular usability heuristics, but besides them they require mobile specific heuristics, such as easy of input, screen readability and glancability, physical interaction and ergonomics and privacy and social convention taken into account. The results showed that a tablet user interface was able to outperform its regular counterpart in task completion times and in number of errors. The implementation also covered those heuristics in a more comprehensive way. But among test persons the most benefit was with users who were familiar with tablets and not with dishwashers. A test user who wasn t familiar with tablets but was with dishwashers performed tasks faster and with fewer errors with regular user interface. In conclusion a tablet user interface enabled users who were familiar with tablets to perform tasks faster and with less errors. Those users were also more satisfied with a tablet user interface than a regular one. On the other hand a test user with little experience of tablets and familiarity with dishwashers was able to perform tasks faster an with less errors with the regular user interface. A tablet user interface was able to offer extra benefits and efficiency to users, but regular user interface should be also available to satisfy users who are not familiar with mobile devices

    The Proceedings of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia

    Get PDF
    Conference Foreword The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fifteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year. The papers cover topics from vulnerabilities in “Internet of Things” protocols through to improvements in biometric identification algorithms and surveillance camera weaknesses. The conference has drawn interest and papers from within Australia and internationally. All submitted papers were subject to a double blind peer review process. Twenty two papers were submitted from Australia and overseas, of which eighteen were accepted for final presentation and publication. We wish to thank the reviewers for kindly volunteering their time and expertise in support of this event. We would also like to thank the conference committee who have organised yet another successful congress. Events such as this are impossible without the tireless efforts of such people in reviewing and editing the conference papers, and assisting with the planning, organisation and execution of the conference. To our sponsors, also a vote of thanks for both the financial and moral support provided to the conference. Finally, thank you to the administrative and technical staff, and students of the ECU Security Research Institute for their contributions to the running of the conference

    Bluetooth Command and Control channel

    No full text
    Bluetooth is popular technology for short-range communications and is incorporated in mobile devices such as smartphones, tablet computers and laptops. Vulnerabilities associated with Bluetooth technology led to improved security measures surrounding Bluetooth connections. Besides the improvement in security features, Bluetooth technology is still plagued by vulnerability exploits. This paper explores the development of a physical Bluetooth C&C channel, moving beyond previous research that mostly relied on simulations. In order to develop a physical channel, certain requirements must be fulfilled and specific aspects regarding Bluetooth technology must be taken into consideration. To measure performance, the newly designed Bluetooth C&C channel is executed in a controlled environment using the Android operating system as a development platform. The results show that a physical Bluetooth C&C channel is indeed possible and the paper concludes by identifying potential strengths and weaknesses of the new channel.http://www.elsevier.com/locate/cosehb2016Computer Scienc
    corecore