Occupancy detection is beneficial for applications such as emergency management and building energy management, as it provides information on the location of occupants. Internet of Things (IoT) devices such as Bluetooth Low Energy (BLE) beacons installed in a building can benefit the performance of occupancy detection systems, by providing information on an occupant's location. However, BLE beacons operate by broadcasting advertisement messages, and this renders them vulnerable to network attacks. Here, we evaluate the effect of two types of malicious spoofing attacks on a BLE based occupancy detection system, and propose an attack detection method. The building blocks of the system include BLE beacons installed inside the building, a mobil...
The internet of things (IoT) has been attracting growing attention in recent years. As one potential...
Smart spaces are those that are aware of their state and can act accordingly. Among the central elem...
Part 4: INTERNET OF THINGS SECURITYInternational audienceThis chapter describes several vulnerabilit...
Occupancy detection of a building has a wide range of applications. Areas such as emergency manageme...
Being able to reliable estimate the occupancy of areas inside a building can prove beneficial for ma...
A reliable estimation of an area’s occupancy can be beneficial to a large variety of applications, a...
Internet of Things (IoT) allows the integration of the physical world with network devices for prope...
In connection with the ongoing COVID-19 pandemic, contact tracing mobile applications (e.g., that le...
In the past decade, embedded technology, known as the Internet of Things, has expanded for many uses...
International audienceSpoofing attacks are generally difficult to detect and can have potentially ha...
Bluetooth technology is a key component of wireless communications. It provides a low-energy and low...
International audienceInternet-of-Things (IoT) devices are nowadays massively integrated in daily li...
Buildings account for about 40% of total energy use in the world and it is estimated that building e...
International audienceNowadays, more and more Internet-of-Things (IoT) smart products, interconnecte...
Building occupants are often assumed to follow deterministic schedules in building performance simul...
The internet of things (IoT) has been attracting growing attention in recent years. As one potential...
Smart spaces are those that are aware of their state and can act accordingly. Among the central elem...
Part 4: INTERNET OF THINGS SECURITYInternational audienceThis chapter describes several vulnerabilit...
Occupancy detection of a building has a wide range of applications. Areas such as emergency manageme...
Being able to reliable estimate the occupancy of areas inside a building can prove beneficial for ma...
A reliable estimation of an area’s occupancy can be beneficial to a large variety of applications, a...
Internet of Things (IoT) allows the integration of the physical world with network devices for prope...
In connection with the ongoing COVID-19 pandemic, contact tracing mobile applications (e.g., that le...
In the past decade, embedded technology, known as the Internet of Things, has expanded for many uses...
International audienceSpoofing attacks are generally difficult to detect and can have potentially ha...
Bluetooth technology is a key component of wireless communications. It provides a low-energy and low...
International audienceInternet-of-Things (IoT) devices are nowadays massively integrated in daily li...
Buildings account for about 40% of total energy use in the world and it is estimated that building e...
International audienceNowadays, more and more Internet-of-Things (IoT) smart products, interconnecte...
Building occupants are often assumed to follow deterministic schedules in building performance simul...
The internet of things (IoT) has been attracting growing attention in recent years. As one potential...
Smart spaces are those that are aware of their state and can act accordingly. Among the central elem...
Part 4: INTERNET OF THINGS SECURITYInternational audienceThis chapter describes several vulnerabilit...