{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T12:49:16Z","timestamp":1726058956065},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030348328"},{"type":"electronic","value":"9783030348335"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-34833-5_20","type":"book-chapter","created":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T13:02:56Z","timestamp":1573822976000},"page":"252-265","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cybersecurity Assessment of the Polar Bluetooth Low Energy Heart-Rate Sensor"],"prefix":"10.1007","author":[{"given":"S.","family":"Soderi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,16]]},"reference":[{"key":"20_CR1","unstructured":"Adafruit Bluefruit LE Connect. \nhttps:\/\/itunes.apple.com\/it\/app\/adafruit-bluefruit-le-connect\/id830125974?mt=8"},{"key":"20_CR2","unstructured":"Apple iPhone SE - Technical Specifications. \nhttps:\/\/support.apple.com\/kb\/sp738?locale=en_GB"},{"key":"20_CR3","unstructured":"Bluetooth 16 Bit UUIDs For Members. \nhttps:\/\/www.bluetooth.com\/specifications\/assigned-numbers\/16-bit-uuids-for-members"},{"key":"20_CR4","unstructured":"Bluetooth Core Specifications. \nhttps:\/\/www.bluetooth.com\/specifications\/bluetooth-core-specification"},{"key":"20_CR5","unstructured":"Bluetooth GATT Characteristics. \nhttps:\/\/www.bluetooth.com\/specifications\/gatt\/characteristics\/"},{"key":"20_CR6","unstructured":"Bluetooth GATT Services. \nhttps:\/\/www.bluetooth.com\/specifications\/gatt\/services\/"},{"key":"20_CR7","unstructured":"Bluetooth Market Update 2018. \nhttps:\/\/www.bluetooth.com\/markets\/market-report"},{"key":"20_CR8","unstructured":"Bluetooth Radio Versions. \nhttps:\/\/www.bluetooth.com\/bluetooth-technology\/radio-versions"},{"key":"20_CR9","unstructured":"Bluetooth SIG. \nhttps:\/\/www.bluetooth.com"},{"key":"20_CR10","unstructured":"BlueZ: An Official Linux Bluetooth protocol stack. \nhttp:\/\/www.bluez.org"},{"key":"20_CR11","unstructured":"BtleJuice Bluetooth Smart (LE) Man-in-the-Middle framework. \nhttps:\/\/github.com\/DigitalSecurity\/BtleJuice"},{"key":"20_CR12","unstructured":"Polar. \nhttps:\/\/www.polar.com\/en"},{"key":"20_CR13","unstructured":"Polar Beat Free Fitness and Training App. \nhttps:\/\/www.polar.com\/en\/products\/polar_beat"},{"key":"20_CR14","unstructured":"SysML Open Source Project - What is SysML? \nhttps:\/\/sysml.org"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"IEEE Standard for Local and metropolitan area networks - Part 15.6: Wireless Body Area Networks, February 2012. \nhttps:\/\/doi.org\/10.1109\/IEEESTD.2012.6161600","DOI":"10.1109\/IEEESTD.2012.6161600"},{"key":"20_CR16","unstructured":"NIST 800\u201330. Guide for Conducting Risk Assessments Revision 1 (2012)"},{"key":"20_CR17","unstructured":"OWASP Testing Guide v4 (2014). \nhttps:\/\/www.owasp.org\/index.php\/OWASP_Testing_Project"},{"key":"20_CR18","unstructured":"Smart body area networks (smartban): system description, January 2018. \nhttp:\/\/www.etsi.org\/deliver\/etsi_tr\/103300_103399\/103394\/01.01.01_60\/tr_103394v010101p.pdf"},{"key":"20_CR19","unstructured":"Cyr, B.S., Horn, W., Miao, D., Specter, M.: Security analysis of wearable fitness devices ( fitbit ) (2014). \nhttps:\/\/pdfs.semanticscholar.org\/f4ab\/ebef4e39791f358618294cd8d040d7024399.pdf"},{"key":"20_CR20","unstructured":"Das, A.K., Pathak, P.H., Chuah, C.N., Mohapatra, P.: Uncovering privacy leakage in BLE network traffic of wearable fitness trackers. In: Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, HotMobile 2016, pp. 99\u2013104. ACM, New York (2016). \nhttp:\/\/doi.acm.org\/10.1145\/2873587.2873594"},{"key":"20_CR21","unstructured":"Filizzola, D., Fraser, S., Samsonau, N.: Security analysis of Bluetooth technology (2018). \nhttps:\/\/courses.csail.mit.edu\/6.857\/2018\/project\/Filizzola-Fraser-Samsonau-Bluetooth.pdf"},{"key":"20_CR22","doi-asserted-by":"publisher","unstructured":"Karani, R., Dhote, S., Khanduri, N., Srinivasan, A., Sawant, R., Gore, G., Joshi, J.: Implementation and design issues for using Bluetooth low energy in passive keyless entry systems. In: 2016 IEEE Annual India Conference (INDICON), pp. 1\u20136, December 2016. \nhttps:\/\/doi.org\/10.1109\/INDICON.2016.7838978","DOI":"10.1109\/INDICON.2016.7838978"},{"issue":"2","key":"20_CR23","doi-asserted-by":"publisher","first-page":"200","DOI":"10.2495\/SAFE-V8-N2-200-211","volume":"8","author":"Tal Melamed","year":"2018","unstructured":"Melamed, T.: An active man-in-the-middle attack on Bluetooth smart devices. Int. J. Saf. Secur. Eng. 8, 200\u2013211 (2018). \nhttps:\/\/doi.org\/10.2495\/SAFE-V8-N2-200-211","journal-title":"International Journal of Safety and Security Engineering"},{"key":"20_CR24","doi-asserted-by":"publisher","unstructured":"Mucchi, L., Jayousi, S., Martinelli, A., Caputo, S., Marcocci, P.: An overview of security threats, solutions and challenges in WBANs for healthcare. In: 2019 13th International Symposium on Medical Information and Communication Technology (ISMICT), pp. 1\u20136, May 2019. \nhttps:\/\/doi.org\/10.1109\/ISMICT.2019.8743798","DOI":"10.1109\/ISMICT.2019.8743798"},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Partala, J., et al.: Security threats against the transmission chain of a medical health monitoring system. In: 2013 IEEE 15th International Conference on e-Health Networking, Applications Services (Healthcom), pp. 243\u2013248, October 2013. \nhttps:\/\/doi.org\/10.1109\/HealthCom.2013.6720675","DOI":"10.1109\/HealthCom.2013.6720675"},{"issue":"6","key":"20_CR26","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1080\/17434440.2018.1483235","volume":"15","author":"Laurie Pycroft","year":"2018","unstructured":"Pycroft, L., Aziz, T.Z.: Security of implantable medical devices with wireless connections: the dangers of cyber-attacks. Expert Rev. Med. Devices 15(6), 403\u2013406 (2018). \nhttps:\/\/doi.org\/10.1080\/17434440.2018.1483235\n\n. pMID: 29860880","journal-title":"Expert Review of Medical Devices"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Scarfone, K.A., Padgette, J.: NIST SP 800\u2013121. Guide to Bluetooth Security (2008)","DOI":"10.6028\/NIST.SP.800-121"},{"issue":"12","key":"20_CR28","doi-asserted-by":"publisher","first-page":"2898","DOI":"10.3390\/s17122898","volume":"17","author":"Jacopo Tosi","year":"2017","unstructured":"Tosi, J., Taffoni, F., Santacatterina, M., Sannino, R., Formica, D.: Performance evaluation of bluetooth low energy: a systematic review. Sensors 17, 2898 (2017). \nhttps:\/\/doi.org\/10.3390\/s17122898","journal-title":"Sensors"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Body Area Networks: Smart IoT and Big Data for Intelligent Health Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-34833-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T13:06:52Z","timestamp":1573823212000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-34833-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030348328","9783030348335"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-34833-5_20","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"16 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BODYNETS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"EAI International Conference on Body Area Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Florence","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bodynets2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/bodynets.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfyPlus","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}