Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (9)

Search Parameters:
Keywords = wireless sniffing

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
10 pages, 2101 KB  
Proceeding Paper
ZigBee Cyberattacks Simulation
by Marieta Haka, Aydan Haka, Veneta Aleksieva and Hristo Valchanov
Eng. Proc. 2025, 104(1), 46; https://doi.org/10.3390/engproc2025104046 - 27 Aug 2025
Viewed by 977
Abstract
ZigBee technology is well-known for wireless network communication and enables low-cost devices operating at low transmission speed and low power consumption in IoT networks. The technology is used for wireless networks through which a large amount of sensitive information passes, which requires ensuring [...] Read more.
ZigBee technology is well-known for wireless network communication and enables low-cost devices operating at low transmission speed and low power consumption in IoT networks. The technology is used for wireless networks through which a large amount of sensitive information passes, which requires ensuring a higher level of security. This creates a need to develop tools to analyze vulnerabilities in such networks. The massive occurrence of cyberattacks requires a more in-depth study to propose adequate and effective approaches for improving security in ZigBee networks. Such research can be performed both in real and simulated environments. In this paper, a new module is proposed for simulating Sniffing, Brute Force, and Dictionary attacks. Full article
Show Figures

Figure 1

21 pages, 1560 KB  
Article
WMLinks: Wearable Smart Devices and Mobile Phones Linking through Bluetooth Low Energy (BLE) and WiFi Signals
by Naixuan Guo, Zhaofeng Chen, Heyang Xu, Yu Liu, Zhechun Zhao and Sen Xu
Electronics 2024, 13(16), 3268; https://doi.org/10.3390/electronics13163268 - 17 Aug 2024
Cited by 3 | Viewed by 1961
Abstract
Wearable smart devices have gradually become indispensable devices in people’s lives. Their security and privacy have gained increasing popularity among the public due to their ability to monitor and record various aspects of users’ daily activities and health data. These devices maintain a [...] Read more.
Wearable smart devices have gradually become indispensable devices in people’s lives. Their security and privacy have gained increasing popularity among the public due to their ability to monitor and record various aspects of users’ daily activities and health data. These devices maintain a wireless connection with mobile phones through periodic signal transmissions, which can be intercepted and analyzed by external observers. While these signal packets contain valuable information about the device owner, the identity of the actual user remains unknown. In this study, we propose two approaches to link wearable smart devices with users’ mobile phones, which serve as electronic identities, to enable novel applications such as multi-device authentication and user-device graph construction for targeted advertising. To establish this linkage, we propose two approaches: a passive-sniffing-based linking approach and an active-interference-based linking approach, which solve the problem of sniffing Bluetooth Low Energy broadcast packets in two stages of Bluetooth Low Energy communication. Through experiments conducted across three scenarios, we demonstrate that seven wearable devices can be successfully linked with an accuracy rate exceeding 80%, with accuracy rates approaching 100% when a device is recorded more than 11 times. Additionally, we find that four wearable devices can be linked via an active-interference-based linking approach with an accuracy rate exceeding 70%. Our results highlight the potential of wearable devices and mobile phones as a means of establishing user identities and enabling the development of more sophisticated applications in the field of wearable technology. Full article
(This article belongs to the Special Issue Wearable Device Design and Its Latest Applications)
Show Figures

Figure 1

12 pages, 888 KB  
Article
Securing Smart Grid Enabled Home Area Networks with Retro-Reflective Visible Light Communication
by Mathew Salas, Sihua Shao, Adrian Salustri, Zachary Schroeck and Jun Zheng
Sensors 2023, 23(3), 1245; https://doi.org/10.3390/s23031245 - 21 Jan 2023
Cited by 7 | Viewed by 3384
Abstract
Smart appliances’ run schedule and electric vehicles charging can be managed over a smart grid enabled home area network (HAN) to reduce electricity demand at critical times and add more plug-in electric vehicles to the grid, which eventually lower customers’ energy bills and [...] Read more.
Smart appliances’ run schedule and electric vehicles charging can be managed over a smart grid enabled home area network (HAN) to reduce electricity demand at critical times and add more plug-in electric vehicles to the grid, which eventually lower customers’ energy bills and reduce greenhouse gas emissions. Short range radio-based wireless communication technologies commonly adopted in a HAN are vulnerable to cyber attacks due to their wide interception range. In this work, a low-cost solution is proposed for securing the low-volume data exchange of sensitive tasks (e.g., key management and mutual authentication). Our approach utilizes the emerging concept of retro-reflector based visible light communication (Retro-VLC), where smart appliances, IoT sensors and other electric devices perform the sensitive data exchange with the HAN gateway via the secure Retro-VLC channel. To conduct the feasibility study, a multi-pixel Retro-VLC link is prototyped to enable quadrature amplitude modulation. The bit error rate of Retro-VLC is studied analytically, numerically and experimentally. A heterogeneous Retro-VLC + WLAN connection is implemented by socket programming. In addition, the working range, sniffing range, and key exchange latency are measured. The results validate the applicability of the Retro-VLC based solution. Full article
Show Figures

Figure 1

25 pages, 881 KB  
Review
Efficient Secure Routing Mechanisms for the Low-Powered IoT Network: A Literature Review
by Muhammad Zunnurain Hussain and Zurina Mohd Hanapi
Electronics 2023, 12(3), 482; https://doi.org/10.3390/electronics12030482 - 17 Jan 2023
Cited by 37 | Viewed by 5856
Abstract
The Wireless Sensor Network in the Internet of Things (WSN-IoT) has been flourishing as another global breakthrough over the past few years. The WSN-IoT is reforming the way we live today by spreading through all areas of life, including the dangerous demographic aging [...] Read more.
The Wireless Sensor Network in the Internet of Things (WSN-IoT) has been flourishing as another global breakthrough over the past few years. The WSN-IoT is reforming the way we live today by spreading through all areas of life, including the dangerous demographic aging crisis and the subsequent decline of jobs. For a company to increase revenues and cost-effectiveness growth should be customer-centered and agile within an organization. WSN-IoT networks have simultaneously faced threats, such as sniffing, spoofing, and intruders. However, WSN-IoT networks are often made up of multiple embedded devices (sensors and actuators) with limited resources that are joined via various connections in a low-power and lossy manner. However, to our knowledge, no research has yet been conducted into the security methods. Recently, a Contiki operating system’s partial implementation of Routing Protocol for Low Power & Lossy Network RPL’s security mechanisms was published, allowing us to evaluate RPL’s security methods. This paper presents a critical analysis of security issues in the WSN-IoT and applications of WSN-IoT, along with network management details using machine learning. The paper gives insights into the Internet of Things in Low Power Networks (IoT-LPN) architecture, research challenges of the Internet of Things in Low Power Networks, network attacks in WSN-IoT infrastructures, and the significant WSN-IoT objectives that need to be accompanied by current WSN-IoT frameworks. Several applied WSN-IoT security mechanisms and recent contributions have been considered, and their boundaries have been stated to be a significant research area in the future. Moreover, various low-powered IoT protocols have been further discussed and evaluated, along with their limitations. Finally, a comparative analysis is performed to assess the proposed work’s performance. The study shows that the proposed work covers a wide range of factors, whereas the rest of the research in the literature is limited. Full article
(This article belongs to the Special Issue Applications of Machine Learning in Real World)
Show Figures

Figure 1

16 pages, 4339 KB  
Article
An Innovative and Cost-Effective Traffic Information Collection Scheme Using the Wireless Sniffing Technique
by Wei-Hsun Lee, Teng-Jyun Liang and Hsuan-Chih Wang
Vehicles 2022, 4(4), 996-1011; https://doi.org/10.3390/vehicles4040054 - 30 Sep 2022
Cited by 1 | Viewed by 2734
Abstract
In recent years, the wireless sniffing technique (WST) has become an emerging technique for collecting real-time traffic information. The spatiotemporal variations in wireless signal collection from vehicles provide various types of traffic information, such as travel time, speed, traveling path, and vehicle turning [...] Read more.
In recent years, the wireless sniffing technique (WST) has become an emerging technique for collecting real-time traffic information. The spatiotemporal variations in wireless signal collection from vehicles provide various types of traffic information, such as travel time, speed, traveling path, and vehicle turning proportion at an intersection, which can be widely used for traffic management applications. However, three problems challenge the applicability of the WST to traffic information collection: the transportation mode classification problem (TMP), lane identification problem (LIP), and multiple devices problem (MDP). In this paper, a WST-based intelligent traffic beacon (ITB) with machine learning methods, including SVM, KNN, and AP, is designed to solve these problems. Several field experiments are conducted to validate the proposed system: three sensor topologies (X-type, rectangle-type, and diamond-type topologies) with two wireless sniffing schemes (Bluetooth and Wi-Fi). Experiment results show that X-type has the best performance among all topologies. For sniffing schemes, Bluetooth outperforms Wi-Fi. With the proposed ITB solution, traffic information can be collected in a more cost-effective way. Full article
Show Figures

Figure 1

19 pages, 2765 KB  
Review
A Systematic Review of Radio Frequency Threats in IoMT
by Irrai Anbu Jayaraj, Bharanidharan Shanmugam, Sami Azam and Ganthan Narayana Samy
J. Sens. Actuator Netw. 2022, 11(4), 62; https://doi.org/10.3390/jsan11040062 - 28 Sep 2022
Cited by 12 | Viewed by 5286
Abstract
In evolving technology, attacks on medical devices are optimized due to the driving force of AI, computer vision, mixed reality, and the internet of things (IoT). Optimizing cybersecurity on the internet of medical things (IoMT) and building cyber resiliency against crime-as-a-service (CaaS) in [...] Read more.
In evolving technology, attacks on medical devices are optimized due to the driving force of AI, computer vision, mixed reality, and the internet of things (IoT). Optimizing cybersecurity on the internet of medical things (IoMT) and building cyber resiliency against crime-as-a-service (CaaS) in the healthcare ecosystem are challenging due to various attacks, including spectrum-level threats at the physical layer. Therefore, we conducted a systematic literature review to identify the research gaps and propose potential solutions to spectrum threats on IoMT devices. The purpose of this study is to provide an overview of the literature on wireless spectrum attacks. The papers we reviewed covered cyber impacts, layered attacks, attacks on protocols, sniffing attacks, field experimentation with cybersecurity testbeds, radiofrequency machine learning, and data collection. In the final section, we discuss future directions, including the sniffing attack mitigation framework in IoMT devices operating under a machine implantable communication system (MICS). To analyze the research papers about physical attacks against IoT in health care, we followed the Preferred Reporting Items for Systematic Reviews (PRISMA) guidelines. Scopus, PubMed, and Web of Science were searched for peer-reviewed articles, and we conducted a thorough search using these resources. The search on Scopus containing the terms “jamming attack” and “health” yielded 330 rows, and the investigation on WoS yielded 17 rows. The search terms “replay attack” and “health” yielded 372 rows in Scopus, while PubMed yielded 23 rows, and WoS yielded 50 articles. The search terms “side-channel attack” and “health” yielded 447 rows in Scopus, WoS yielded 30 articles, and the search terms “sniffing attack” and “health” yielded 18 rows in Scopus, while PubMed yielded 1 row, and WoS yielded 0 articles. The terms “spoofing attack” and “health” yielded 316 rows in Scopus, while PubMed yielded 5 rows, and WoS yielded 23 articles. Finally, the search terms “tampering attack” and “health” yielded 25 rows in Scopus, PubMed yielded 14 rows, and WoS yielded 46 rows. The search time frame was from 2003 to June 2022. The findings show a research gap in sniffing, tampering, and replay attacks on the IoMT. We have listed the items that were included and excluded and provided a detailed summary of SLR. A thorough analysis of potential gaps has been identified, and the results are visualized for ease of understanding. Full article
Show Figures

Figure 1

16 pages, 2218 KB  
Article
Cooperative Friendly Jamming Techniques for Drone-Based Mobile Secure Zone
by Ga-Hye Jeon, Ji-Hyun Lee, Yeon-Su Sung, Hyun-Ju Park, You-Jin Lee, Sun-Woo Yun and Il-Gu Lee
Sensors 2022, 22(3), 865; https://doi.org/10.3390/s22030865 - 24 Jan 2022
Cited by 13 | Viewed by 5965
Abstract
Threats of eavesdropping and information leakages have increased sharply owing to advancements in wireless communication technology. In particular, the Internet of Things (IoT) has become vulnerable to sniffing or jamming attacks because broadcast communication is usually conducted in open-network environments. Although improved security [...] Read more.
Threats of eavesdropping and information leakages have increased sharply owing to advancements in wireless communication technology. In particular, the Internet of Things (IoT) has become vulnerable to sniffing or jamming attacks because broadcast communication is usually conducted in open-network environments. Although improved security protocols have been proposed to overcome the limitations of wireless-communication technology and to secure safe communication channels, they are difficult to apply to mobile communication networks and IoT because complex hardware is required. Hence, a novel security model with a lighter weight and greater mobility is needed. In this paper, we propose a security model applying cooperative friendly jamming using artificial noise and drone mobility, which are autonomous moving objects, and we demonstrate the prevention of eavesdropping and improved security through simulations and field tests. The Cooperative Friendly Jamming Techniques for Drone-based Mobile Secure Zone (CFJ-DMZ) can set a secure zone in a target area to support a safe wireless mobile communication network through friendly jamming, which can effectively reduce eavesdropping threats. According to the experimental results, the average information leakage rate of the eavesdroppers in CFJ-DMZ-applied scenarios was less than or equal to 3%, an average improvement of 92% over conventional methods. Full article
Show Figures

Figure 1

36 pages, 2063 KB  
Article
Implementation of WirelessHART in the NS-2 Simulator and Validation of Its Correctness
by Pouria Zand, Emi Mathews, Paul Havinga, Spase Stojanovski, Emiliano Sisinni and Paolo Ferrari
Sensors 2014, 14(5), 8633-8668; https://doi.org/10.3390/s140508633 - 16 May 2014
Cited by 46 | Viewed by 14789
Abstract
One of the first standards in the wireless sensor networks domain,WirelessHART (HART (Highway Addressable Remote Transducer)), was introduced to address industrial process automation and control requirements. This standard can be used as a reference point to evaluate other wireless protocols in the domain [...] Read more.
One of the first standards in the wireless sensor networks domain,WirelessHART (HART (Highway Addressable Remote Transducer)), was introduced to address industrial process automation and control requirements. This standard can be used as a reference point to evaluate other wireless protocols in the domain of industrial monitoring and control. This makes it worthwhile to set up a reliable WirelessHART simulator in order to achieve that reference point in a relatively easy manner. Moreover, it offers an alternative to expensive testbeds for testing and evaluating the performance of WirelessHART. This paper explains our implementation of WirelessHART in the NS-2 network simulator. According to our knowledge, this is the first implementation that supports the WirelessHART network manager, as well as the whole stack (all OSI (Open Systems Interconnection model) layers) of the WirelessHART standard. It also explains our effort to validate the correctness of our implementation, namely through the validation of the implementation of the WirelessHART stack protocol and of the network manager. We use sniffed traffic from a realWirelessHART testbed installed in the Idrolab plant for these validations. This confirms the validity of our simulator. Empirical analysis shows that the simulated results are nearly comparable to the results obtained from real networks. We also demonstrate the versatility and usability of our implementation by providing some further evaluation results in diverse scenarios. For example, we evaluate the performance of the WirelessHART network by applying incremental interference in a multi-hop network. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Graphical abstract

27 pages, 402 KB  
Article
Estimation of Physical Layer Performance in WSNs Exploiting the Method of Indirect Observations
by Giuseppe Colistra and Luigi Atzori
J. Sens. Actuator Netw. 2012, 1(3), 272-298; https://doi.org/10.3390/jsan1030272 - 30 Nov 2012
Cited by 5 | Viewed by 9667
Abstract
Wireless Sensor Networks (WSNs) are used in many industrial and consumer applications that are increasingly gaining impact in our day to day lives. Still great efforts are needed towards the definition of methodologies for their effective management. One big issue is themonitoring of [...] Read more.
Wireless Sensor Networks (WSNs) are used in many industrial and consumer applications that are increasingly gaining impact in our day to day lives. Still great efforts are needed towards the definition of methodologies for their effective management. One big issue is themonitoring of the network status, which requires the definition of the performance indicators and methodologies and should be accurate and not intrusive at the same time. In this paper, we present a new process for the monitoring of the physical layer in WSNs making use of a completely passive methodology. From data sniffed by external nodes, we first estimate the position of the nodes by applying the Weighted Least Squares (WLS) to the method of indirect observations. The resulting node positions are then used to estimate the status of the communication links using the most appropriate propagation model. We performed a significant number of measurements on the field in both indoor and outdoor environments. From the experiments, we were able to achieve an accurate estimation of the channel links status with an average error lower than 1 dB, which is around 5 dB lower than the error introduced without the application of the proposed method. Full article
(This article belongs to the Special Issue Internet of Things: Technologies and Applications)
Show Figures

Figure 1

Back to TopTop