Muder Almiani, A. Razaque, Liu Yimu, M. J. Khan, Tang Minjie, Mohammed Alweshah, Saleh Atiewi
{"title":"蓝牙应用层包过滤防范蓝源攻击","authors":"Muder Almiani, A. Razaque, Liu Yimu, M. J. Khan, Tang Minjie, Mohammed Alweshah, Saleh Atiewi","doi":"10.1109/FMEC.2019.8795354","DOIUrl":null,"url":null,"abstract":"In recent years, the application of Bluetooth has always been the highly debated topic among the researches. Through the Bluetooth protocol, Bluetooth can implement the data switching in short distance between various devices. Nevertheless, BlueBorne Attack makes the seemingly stable Bluetooth protocols full of vulnerabilities. Our research will concentrate on predicting the BlueBorne Attack with the following directions: the working mechanism, the working methods and effective range of BlueBorne. Based on the comprehensive review of recent peer-reviewed researches, this project provides a new model based on application layer to solve the security problem of BlueBorne. The paper asserts that compared with the previous research, the unique model has better consequence with highly stability.","PeriodicalId":101825,"journal":{"name":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Bluetooth Application-Layer Packet-Filtering For Blueborne Attack Defending\",\"authors\":\"Muder Almiani, A. Razaque, Liu Yimu, M. J. Khan, Tang Minjie, Mohammed Alweshah, Saleh Atiewi\",\"doi\":\"10.1109/FMEC.2019.8795354\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In recent years, the application of Bluetooth has always been the highly debated topic among the researches. Through the Bluetooth protocol, Bluetooth can implement the data switching in short distance between various devices. Nevertheless, BlueBorne Attack makes the seemingly stable Bluetooth protocols full of vulnerabilities. Our research will concentrate on predicting the BlueBorne Attack with the following directions: the working mechanism, the working methods and effective range of BlueBorne. Based on the comprehensive review of recent peer-reviewed researches, this project provides a new model based on application layer to solve the security problem of BlueBorne. The paper asserts that compared with the previous research, the unique model has better consequence with highly stability.\",\"PeriodicalId\":101825,\"journal\":{\"name\":\"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FMEC.2019.8795354\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Fourth International Conference on Fog and Mobile Edge Computing (FMEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FMEC.2019.8795354","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Bluetooth Application-Layer Packet-Filtering For Blueborne Attack Defending
In recent years, the application of Bluetooth has always been the highly debated topic among the researches. Through the Bluetooth protocol, Bluetooth can implement the data switching in short distance between various devices. Nevertheless, BlueBorne Attack makes the seemingly stable Bluetooth protocols full of vulnerabilities. Our research will concentrate on predicting the BlueBorne Attack with the following directions: the working mechanism, the working methods and effective range of BlueBorne. Based on the comprehensive review of recent peer-reviewed researches, this project provides a new model based on application layer to solve the security problem of BlueBorne. The paper asserts that compared with the previous research, the unique model has better consequence with highly stability.