Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Long Distance Bluetooth Low Energy Exploitation On A Wireless Attack Platform, Stephanie L. Long Mar 2021

Long Distance Bluetooth Low Energy Exploitation On A Wireless Attack Platform, Stephanie L. Long

Theses and Dissertations

In the past decade, embedded technology, known as the Internet of Things, has expanded for many uses. The smart home infrastructure has drastically grown to include networked refrigerators, lighting systems, speakers, watches, and more. This increase in the use of wireless protocols provides a larger attack surface for cyber actors than ever before. Wireless loT traffic is susceptible for sniffing by an attacker. The attack platform skypie is upgraded to incorporate Bluetooth Low Energy (BLE) beacon collection for pattern-of-life data, as well as device characteristic enumeration and potential characteristic modification. This platform allows an attacker to mount the skypie to …


An Atm System Model And Wireless Channel Simulation, Karen Dunne Dec 2000

An Atm System Model And Wireless Channel Simulation, Karen Dunne

Masters

Congestion in the low frequency regions of the electromagnetic spectrum and demand for support of high bandwidth applications has prompted widespread investigations into networking technologies and communications media. Traditional networking technologies such as Ethernet that are not capable of adequately supporting high bandwidth applications (e.g. videoconferencing) are being replaced by high speed, high bandwidth technologies such as Asynchronous Transfer Mode (ATM). In the communications media market, wireless systems are becoming ubiquitous due to their ease of installation and maintenance costs. In this research, the networking technology of interest is ATM. ATM used a cell switching architecture that allows seamless support …