196 research outputs found

    Bluetooth Security Protocol Analysis and Improvements

    Get PDF
    Since its creation, Bluetooth has transformed itself from a cable replacement technology to a wireless technology that connects people and machines. Bluetooth has been widely adapted on mobile phones and PDAs. Many other vendors in other industries are integrating Bluetooth into their products. Although vendors are adapting to the technology, Bluetooth hasn’t been a big hit among users. Security remains a major concern. Poor implementation of the Bluetooth architecture on mobile devices leads to some high profiled Bluetooth hacks. Weak security protocol designs expose the Bluetooth system to some devastating protocol attacks. This paper first explores four Bluetooth protocol-level attacks in order to get deeper insights into the weakness of the Bluetooth security design. It then proposes enhancements to defense against those attacks. Performance comparison will be given based on the implementation of those enhancements on a software based Bluetooth simulator

    Human centric security and privacy for the IoT using formal techniques

    Get PDF
    In this paper, we summarize a new approach to make security and privacy issues in the Internet of Things (IoT) more transparent for vulnerable users. As a pilot project, we investigate monitoring of Alzheimer’s patients for a low-cost early warning system based on bio-markers supported with smart technologies. To provide trustworthy and secure IoT infrastructures, we employ formal methods and techniques that allow specification of IoT scenarios with human actors, refinement and analysis of attacks and generation of certified code for IoT component architectures

    Blurtooth: Exploiting cross-transport key derivation in Bluetooth classic and Bluetooth low energy

    Get PDF
    Bluetooth is a pervasive wireless technology specified in an open standard. The standard defines Bluetooth Classic (BT) for high- throughput wireless services and Bluetooth Low Energy (BLE) very low-power ones. The standard also specifies security mechanisms, such as pairing, session establishment, and cross-transport key derivation (CTKD). CTKD enables devices to establish BT and BLE security keys by pairing just once. CTKD was introduced in 2014 with Bluetooth 4.2 to improve usability. However, the security im- plications of CTKD were not studied carefully. This work demonstrates that CTKD is a valuable and novel Blue- tooth attack surface. It enables, among others, to exploit BT and BLE just by targeting one of the two (i.e., Bluetooth cross-transport ex- ploitation). We present the design of the first cross-transport attacks on Bluetooth. Our attacks exploit issues that we identified in the specification of CTKD. For example, we find that CTKD enables an adversary to overwrite pairing keys across transports. We leverage these vulnerabilities to impersonate, machine-in-the-middle, and establish unintended sessions with any Bluetooth device support- ing CTKD. Since the presented attacks blur the security boundary between BT and BLE, we name them BLUR attacks. We provide a low-cost implementation of the attacks and test it on a broad set of devices. In particular, we successfully attack 16 devices with 14 unique Bluetooth chips from popular vendors (e.g., Cypress, Intel, Qualcomm, CSR, Google, and Samsung), with Bluetooth standard versions of up to 5.2. We discuss why the countermeasures in the Bluetooth are not effective against our attacks, and we develop and evaluate practical and effective alternatives

    Pothole Reporting System

    Get PDF
    The purpose of this project is to create a pothole detection device that can be attached to the underside of a commercial vehicle. Potholes cost motorists around 6.4 billion dollars annually, thus demonstrating the need for a system to aid with the detections and reporting of potholes. The four systems we needed to consider for the implementation of this project were the power system, the sensing system, the data processing system, and the reporting and logging system. Power pulled from the vehicle will enable the sensors and data processing module. The data processing module will analyze the readings from the sensors and output pothole data to the logging and reporting system. The logging and reporting system, located on an android mobile device, will store the pothole locations on a cloud server

    Pothole Reporting System

    Get PDF
    The purpose of this project is to create a pothole detection device that can be attached to the underside of a commercial vehicle. Potholes cost motorists around 6.4 billion dollars annually, thus demonstrating the need for a system to aid with the detection and reporting of potholes. The four systems we needed to consider for the implementation of this project were the power system, the sensing system, the data processing system, and the reporting and logging system. Power pulled from the vehicle will enable the sensors and data processing module. The data processing module will analyze the readings from the sensors and output pothole data to the logging and reporting system. The logging and reporting system, located on an android mobile device, will store the pothole locations on a cloud server

    Pothole Reporting System

    Get PDF
    The purpose of this project is to create a pothole detection device that can be attached to the underside of a commercial vehicle. Potholes cost motorists around 6.4 billion dollars annually, thus demonstrating the need for a system to aid with the detection and reporting of potholes. The four systems we needed to consider for the implementation of this project were the power system, the sensing system, the data processing system, and the reporting and logging system. Power pulled from the vehicle will enable the sensors and data processing module. The data processing module will analyze the readings from the sensors and output pothole data to the logging and reporting system. The logging and reporting system, located on an android mobile device, will store the pothole locations on a cloud server

    5 degree of freedom robotic Arm

    Get PDF
    This thesis report is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Electrical and Electronic Engineering, 2016.Cataloged from PDF version of thesis report.Includes bibliographical references (page 96).A robotic arm is one type of mechanical arm which is similar to a human arm and can do most of the works that a human arm can do. It can do various works which is very risky for a human. A robotic arm is programmable and can do the works through instructions. In today’s world robotic arms are used in industries, rescue purpose and various research works. Considering the facts we thought of designing and making some improvements in robotic arm. Our robotic arm is an arduino controlled six degree freedom robot arm which can move 360 degree and in 6 directions and can do almost all the works of gripping. First of all, the unique part of our robotic arm is, a counter weight is used here to balance the arm while some object is gripped. Secondly, it is able to move to a specific point of its workspace through x, y and z axis values automatically if the points are given. For giving command we are using Bluetooth serial communication system through an Application. This work presents a 6 degree robotic arm with a gripper, controlled with an android application and Arduino MEGA via Bluetooth to carry or load materials. Here, the app searches for the Bluetooth connection, if the Bluetooth device connected with robot is open for connection, then the android app connects with it. Then the app sends command to the Arduino MEGA connected with the robot which is the brain of the robot, this command is fetched by the Arduino MEGA and according to the command it moves the robot forward, backward, left turn, right turn, stop and it expands the gripper to pick a material, squeezes the gripper when a material is picked and it can also move the gripper in left or right direction according to need.Md. Rashed IqbalUmme AyshaTanjila RobyatB. Electrical and Electronic Engineerin
    • …
    corecore