Wi-attack: Cross-technology Impersonation Attack against iBeacon Services.
Xin NaXiuzhen GuoYuan HeRui XiPublished in: SECON (2021)
Keyphrases
- countermeasures
- key technologies
- authentication protocol
- web services
- information society
- cost effective
- information systems
- artificial intelligence
- ubiquitous computing
- web intelligence
- lifecycle management
- enabling technologies
- security risks
- service oriented
- smart card
- service providers
- low cost
- end users
- information technology