{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T04:04:06Z","timestamp":1747454646149,"version":"3.40.5"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031928857","type":"print"},{"value":"9783031928864","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-92886-4_4","type":"book-chapter","created":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T08:32:29Z","timestamp":1747384349000},"page":"49-63","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Checking the\u00a0Impact of\u00a0Security Standardization \u2014 A Case Study on\u00a0Bluetooth LE Pairing of\u00a0Internet-of-Things Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7256-0387","authenticated-orcid":false,"given":"Henrich C.","family":"P\u00f6hls","sequence":"first","affiliation":[]},{"given":"Lukas","family":"Steffens","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,16]]},"reference":[{"key":"4_CR1","unstructured":"Abus: Hometec pro CFA3100. https:\/\/www.abus.com\/int\/Consumer\/Door-security\/HomeTec-Pro-Bluetooth-R-door-lock-drive\/HomeTec-Pro-CFA3100 Accessed 22-Nov-2024"},{"key":"4_CR2","unstructured":"Abus: Wintecto one. https:\/\/www.abus.com\/de\/Privat\/Fenstersicherheit\/Smarter-Fensterantrieb\/WINTECTO-One Accessed 22-Nov-2024"},{"key":"4_CR3","unstructured":"Bluetooth special interest group: bluetooth core specification revision 5.4. (2023). https:\/\/www.bluetooth.org\/DocMan\/handlers\/DownloadDoc.ashx?doc_id=556599 Accessed 22-Nov-2024"},{"key":"4_CR4","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik: BSI warnt vor dem Einsatz unsicherer Funk-T\u00fcrschl\u00f6sser der Marke ABUS (2022). https:\/\/www.bsi.bund.de\/DE\/Service-Navi\/Presse\/Pressemitteilungen\/Presse2022\/220810_Warnung_ABUS.html?nn=1069070"},{"key":"4_CR5","unstructured":"Bundesamt f\u00fcr sicherheit in der informationstechnik: funk-t\u00fcrschlossantrieb hometec pro CFA3000 des herstellers ABUS risikostufe [CERT2022]: 3 - hoch) (2022). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/Warnungen-nach-P7_BSIG\/Archiv\/2022\/BSI_W-005-220810.html"},{"key":"4_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108712","volume":"205","author":"M C\u00e4sar","year":"2022","unstructured":"C\u00e4sar, M., Pawelke, T., Steffan, J., Terhorst, G.: A survey on bluetooth low energy security and privacy. Comput. Netw. 205, 108712 (2022). https:\/\/doi.org\/10.1016\/j.comnet.2021.108712","journal-title":"Comput. Netw."},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Das, A.K., Pathak, P.H., Chuah, C., Mohapatra, P.: Uncovering privacy leakage in BLE network traffic of wearable fitness trackers. In: Chu, D., Dutta, P. (eds.) Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, HotMobile 2016, St. Augustine, FL, USA, February 23-24, 2016, pp. 99\u2013104. ACM (2016). https:\/\/doi.org\/10.1145\/2873587.2873594","DOI":"10.1145\/2873587.2873594"},{"key":"4_CR8","unstructured":"European parliament and the council of the European Union: Directive 2014\/53\/EU of the European parliament and of the council of 16 April 2014 on the harmonisation of the laws of the member states relating to the making available on the market of radio equipment and repealing Directive 1999\/5\/EC Text with EEA relevance. Official J. OJ\u00a0L\u00a0153 (2014)"},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"Hale, M.L., Ellis, D., Gamble, R., Waler, C., Lin, J.: Secu wear: an open source, multi-component hardware\/software platform for exploring wearable security. In: 2015 IEEE International Conference on Mobile Services, pp. 97\u2013104 (2015). https:\/\/doi.org\/10.1109\/MobServ.2015.23","DOI":"10.1109\/MobServ.2015.23"},{"key":"4_CR10","unstructured":"Huahuacaocao: flower care smart monitor. http:\/\/www.huahuacaocao.com\/product Accessed 22-Nov-2024"},{"key":"4_CR11","unstructured":"Inkbird: bluetooth temperature and humidity sensor ibs-th2. https:\/\/inkbird.com\/products\/hygrometer-ibs-th2 Accessed 22-Nov-2024"},{"key":"4_CR12","doi-asserted-by":"publisher","unstructured":"Langone, M., Setola, R., Lopez, J.: Cybersecurity of wearable devices: an experimental analysis and a vulnerability assessment method. In: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). vol.\u00a02, pp. 304\u2013309 (2017). https:\/\/doi.org\/10.1109\/COMPSAC.2017.96","DOI":"10.1109\/COMPSAC.2017.96"},{"key":"4_CR13","unstructured":"Nordic semiconductor: installing the nrf sniffer. https:\/\/docs.nordicsemi.com\/bundle\/ug_sniffer_ble\/page\/UG\/sniffer_ble\/installing_sniffer.html Accessed 22-Nov-2024"},{"key":"4_CR14","unstructured":"Nordic semiconductor: nrf52840 dongle. https:\/\/www.nordicsemi.com\/Products\/Development-hardware\/nRF52840-Dongle\/GetStarted?lang=en Accessed 22-Nov-2024"},{"key":"4_CR15","doi-asserted-by":"publisher","unstructured":"Robles-Cordero, A.M., Zayas, W.J., Peker, Y.K.: Extracting the security features implemented in a bluetooth LE connection. In: IEEE International Conference on Big Data (Big Data), pp. 2559\u20132563 (2018). https:\/\/doi.org\/10.1109\/BigData.2018.8622000","DOI":"10.1109\/BigData.2018.8622000"},{"key":"4_CR16","unstructured":"Royal Gardineer: Royal gardineer 4in1-pflanzensensor sun-141 mit bluetooth und app-kontrolle, 4er-set. https:\/\/www.royal-gardineer.de\/Pflanzensensor-ZX-2812-919.shtml Accessed 22-Nov-2024"},{"key":"4_CR17","unstructured":"Ryan, M.: Bluetooth: with low energy comes low security. In: 7th USENIX workshop on offensive technologies (WOOT 13). USENIX Association, Washington, D.C. (2013). https:\/\/www.usenix.org\/conference\/woot13\/workshop-program\/presentation\/ryan"},{"key":"4_CR18","unstructured":"Samsung: Galaxy watch active2 40 mm under armour edition. https:\/\/www.samsung.com\/de\/watches\/galaxy-watch-active\/galaxy-watch-active2-r830-under-armour-edition-sm-r830nzkuxeg\/#specs Accessed 22-Nov-2024"},{"key":"4_CR19","doi-asserted-by":"publisher","unstructured":"Silva-Trujillo, A.G., Gonz\u00e1lez\u00a0Gonz\u00e1lez, M.J., Rocha\u00a0P\u00e9rez, L.P., Garc\u00eda\u00a0Villalba, L.J.: Cybersecurity analysis of wearable devices: Smartwatches passive attack. Sensors 23(12) (2023). https:\/\/doi.org\/10.3390\/s23125438","DOI":"10.3390\/s23125438"},{"key":"4_CR20","unstructured":"Steffens, L.: Evaluation results of alecsa. https:\/\/github.com\/Luki42\/alecsa_evaluation (2024) Accessed 22-Nov-2024"},{"key":"4_CR21","unstructured":"SwitchBot Inc: Switchbot bot. https:\/\/eu.switch-bot.com\/products\/switchbot-bot Accessed 22-Nov-2024"},{"key":"4_CR22","unstructured":"Xiaomi: Mi door and window sensor 2. https:\/\/www.mi.com\/de\/product\/mi-door-and-window-sensor-2\/ Accessed 22-Nov-2024"},{"key":"4_CR23","unstructured":"Xiaomi: Mi temperature and humidity monitor 2. https:\/\/www.mi.com\/de\/product\/mi-temperature-and-humidity-monitor-2\/ Accessed 22-Nov-2024"},{"key":"4_CR24","doi-asserted-by":"publisher","unstructured":"Xu, J., et al.: Pairing and authentication security technologies in low-power bluetooth. In: IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, pp. 1081\u20131085 (2013). https:\/\/doi.org\/10.1109\/GreenCom-iThings-CPSCom.2013.185","DOI":"10.1109\/GreenCom-iThings-CPSCom.2013.185"},{"key":"4_CR25","doi-asserted-by":"publisher","unstructured":"Zendehdel, G.A., Kaur, R., Chopra, I., Stakhanova, N., Scheme, E.: Automated security assessment framework for wearable ble-enabled health monitoring devices. ACM Trans. Internet Technol. 22(1) (2021). https:\/\/doi.org\/10.1145\/3448649","DOI":"10.1145\/3448649"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-92886-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,16]],"date-time":"2025-05-16T08:32:40Z","timestamp":1747384360000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-92886-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031928857","9783031928864"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-92886-4_4","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"16 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that\u00a0are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2025.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}