34,124 research outputs found

    Smart homes under siege: Assessing the robustness of physical security against wireless network attacks

    Get PDF
    © 2024 The Authors. Published by Elsevier Ltd. This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY), https://creativecommons.org/licenses/by/4.0/Nowadays domestic smart security devices, such as smart locks, smart doorbells, and security cameras, are becoming increasingly popular with users, due to their ease of use, convenience, and declining prices. Unlike conventional non-smart security devices, such as alarms and locks, performance standards for smart security devices, such as the British TS 621, are not easily understandable by end users due to the technical language employed. Users also have very few sources of unbiased information regarding product performance in real world conditions and protection against attacks from cyber attacker-burglars and, as a result, tend to take manufacturer claims at face value. This means that, as this work proves, users may be exposed to threats, such as theft, impersonation (should an attacker steal their credentials), and even physical injury, if the device fails and is used to prevent access to hazardous environments. As such, this paper deploys several attacks using popular wireless attack vectors (i.e., 433MHz radio, Bluetooth, and RFID) against domestic smart security devices to assess the protection offered against a cyber attacker-burglar. Our results suggest that users are open to considerable cyber physical attacks, irrespective if they use lesser known (i.e., no name) or branded smart security devices, due to the poor security offered by these devices.Peer reviewe

    Eritrea: the siege state

    Get PDF
    To prevent Eritrea from becoming the Horn of Africa’s next failed state, the international community must engage more with the country

    Countering CBW Proliferation

    Get PDF
    No description supplie

    Windmills and the production of gunpowder in Malta

    Get PDF
    Each and every discussion revolving around the history of windmills in Malta has always and, wrongly so, focused on their exclusive use for grinding wheat and barley, without taking into consideration that some of these windmills, in particular those situated behind the fortified walls (but not only), could have had a dual function; that of being powder mills and machines for the grinding of corn. Old maps of the Grand Harbour have clearly documented the use of windmills in Malta forthe exclusive production of gunpowder at the turn of the seventeenth century. For security reasons, gunpowder mills were mostly situated within the city walls. However, in the absence of historical records, the major difficulties are: which of these windmills were used for milling grain? Which had a dual function? Which were used exclusively for producing gun powder? This paper seeks to answer these questions.peer-reviewe

    Rocks and Rockets: Oslo's Inevitable Conclusion

    Get PDF
    Though the al-Aqsa intifada took the world by surprise, Palestinians are now almost unanimous in attributing its scope to the failures of Oslo. The author analyzes these failures from to perspectives: those concerning implementation and structural flaws. In describing the unfolding of the intifada and particularly its militarization, the author analyzes the primordial role of Fatah, the single most important factor in transforming the early clashes into a sustained rebellion

    The Middle East: intractable conflict?: the transformation of Hamas?

    Get PDF
    • …
    corecore