SeamBlue: Seamless Bluetooth Low Energy Connection Migration for Unmodified IoT Devices

作者: Shahriar Nirjon , Syed Rafiul Hussain , Shagufta Mehnaz , Elisa Bertino

DOI: 10.5555/3108009.3108027

关键词:

摘要: At present, Bluetooth Low Energy (BLE) is dominantly used in commercially available Internet of Things (IoT) devices – such as smart watches, fitness trackers, and appliances. Compared to classic Bluetooth, BLE has been simplified many ways that include its connection establishment, data exchange, encryption processes. Unfortunately, this simplification comes at a cost. For example, only star topology supported environments peripheral (an IoT device) can communicate with one gateway (e.g. smartphone, or hub) set time. When goes out range, it loses connectivity gateway, cannot connect seamlessly another without user interventions. In other words, connections are not automatically migrated handed-off gateway. paper, we propose SeamBlue , which brings seamless BLE-capable mobile an environment consists network gateways. Our framework ensures unmodified, commercial off-the-shelf securely nearby any intervention.

参考文章(19)
Fernando A. Teixeira, Gustavo V. Machado, Fernando M. Q. Pereira, Hao Chi Wong, José M. S. Nogueira, Leonardo B. Oliveira, SIoT: securing the internet of things through distributed system analysis information processing in sensor networks. pp. 310- 321 ,(2015) , 10.1145/2737095.2737097
Carles Gomez, Joaquim Oller, Josep Paradells, Overview and Evaluation of Bluetooth Low Energy: An Emerging Low-Power Wireless Technology Sensors. ,vol. 12, pp. 11734- 11753 ,(2012) , 10.3390/S120911734
Yufei Tao, Christos Faloutsos, Dimitris Papadias, Bin Liu, Prediction and indexing of moving objects with unknown motion patterns international conference on management of data. pp. 611- 622 ,(2004) , 10.1145/1007568.1007637
D. Wong, Teng Joon Lim, Soft handoffs in CDMA mobile systems IEEE Personal Communications. ,vol. 4, pp. 6- 17 ,(1997) , 10.1109/98.637378
Ayaskant Rath, Shivendra Panwar, Fast handover in cellular networks with femtocells 2012 IEEE International Conference on Communications (ICC). pp. 2752- 2757 ,(2012) , 10.1109/ICC.2012.6363687
Chris Lattner, Andrew Lenharth, Vikram Adve, Making context-sensitive points-to analysis with heap cloning practical for the real world Proceedings of the 2007 ACM SIGPLAN conference on Programming language design and implementation - PLDI '07. ,vol. 42, pp. 278- 289 ,(2007) , 10.1145/1250734.1250766
Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino, An efficient certificateless cryptography scheme without pairing Proceedings of the third ACM conference on Data and application security and privacy - CODASPY '13. pp. 181- 184 ,(2013) , 10.1145/2435349.2435375
Qi Alfred Chen, Zhiyun Qian, Yunhan Jack Jia, Yuru Shao, Zhuoqing Morley Mao, Static Detection of Packet Injection Vulnerabilities: A Case for Identifying Attacker-controlled Implicit Information Leaks computer and communications security. pp. 388- 400 ,(2015) , 10.1145/2810103.2813643
Thomas Zachariah, Noah Klugman, Bradford Campbell, Joshua Adkins, Neal Jackson, Prabal Dutta, The Internet of Things Has a Gateway Problem international workshop on mobile computing systems and applications. pp. 27- 32 ,(2015) , 10.1145/2699343.2699344
Bjarne Steensgaard, Points-to analysis in almost linear time symposium on principles of programming languages. pp. 32- 41 ,(1996) , 10.1145/237721.237727