{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:25:28Z","timestamp":1750501528836,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T00:00:00Z","timestamp":1687824000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,27]],"date-time":"2023-06-27T00:00:00Z","timestamp":1687824000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,6,27]]},"DOI":"10.1109\/iwssip58668.2023.10180264","type":"proceedings-article","created":{"date-parts":[[2023,7,18]],"date-time":"2023-07-18T17:29:52Z","timestamp":1689701392000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Assessing Cybersecurity Risks in BLE-based Asset Management Systems"],"prefix":"10.1109","author":[{"given":"David","family":"Verde","sequence":"first","affiliation":[{"name":"Instituto Polit&#x00E9;cnico de Viana do Castelo,ADiT-Lab,Viana do Castelo,Portugal,4900-348"}]},{"given":"Sara","family":"Paiva","sequence":"additional","affiliation":[{"name":"Instituto Polit&#x00E9;cnico de Viana do Castelo,ADiT-Lab,Viana do Castelo,Portugal,4900-348"}]},{"given":"Sergio","family":"Lopes","sequence":"additional","affiliation":[{"name":"Universidade do Minho,Algoritmi Research Centre,Guimar&#x00E3;es,Portugal"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2911558"},{"article-title":"Indoor positioning systems","year":"0","author":"ray bernard","key":"ref12"},{"journal-title":"Securing medical devices and protecting patient privacy in the technological age of healthcare","year":"2016","author":"martin","key":"ref15"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.4"},{"journal-title":"Cyber-Physical Attacks A Growing Invisible Threat","year":"2015","author":"loukas","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3341325.3342000"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911424"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2022.3149732"},{"key":"ref2","article-title":"Cyber security for the defence industry","author":"sharma","year":"2017","journal-title":"Cyber Security Rev"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-016-9864-0"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2975167.2975173"},{"key":"ref16","article-title":"Security and privacy of wireless beacon systems","author":"chan","year":"2021","journal-title":"arXiv preprint arXiv 2107 05868"},{"year":"2022","key":"ref19","article-title":"Information security, cybersecurity and privacy protection &#x2014; guidance on managing information security risks"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2015.7179452"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/fi11090194"},{"article-title":"Enterprise iot device visibility","year":"2021","author":"ho","key":"ref23"},{"article-title":"Analysis of iot security weaknesses and ways to protect against them","year":"2020","author":"vahed","key":"ref26"},{"article-title":"Bluetooth low energy security analysis framework","year":"2018","author":"janesko","key":"ref25"},{"journal-title":"ZigBee Wireless Networks and Transceivers","year":"2011","author":"farahani","key":"ref20"},{"journal-title":"An empirical analysis of security and privacy in health and medical systems","year":"2016","author":"rushanan","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/su15010717"},{"key":"ref28","article-title":"A survey of security vulnerabilities in bluetooth low energy beacons","author":"tay","year":"2016","journal-title":"Carnegie Mellon University Parallel Data Lab Technical Report CMU-PDL-16-109"},{"journal-title":"Medium access control (MAC) layer design and data query processing for wireless sensor networks","year":"2007","author":"ren","key":"ref27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065923"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISC255366.2022.9922314"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/2083094"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICeND.2015.7328540"},{"key":"ref4","first-page":"2","article-title":"Bluetooth low energy beacons","author":"lindh","year":"2015","journal-title":"Texas Instruments"},{"key":"ref3","article-title":"Investigating overall structure of cyber-attacks on smart-grid control systems to improve cyber resilience in power system","volume":"1","author":"ghiasi","year":"2020","journal-title":"Network"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/s16050596"},{"key":"ref5","first-page":"16 359","article-title":"Beacon for proximity target marketing","volume":"15","author":"allurwar","year":"2016","journal-title":"International Journal of Computational Engineering Science"}],"event":{"name":"2023 30th International Conference on Systems, Signals and Image Processing (IWSSIP)","start":{"date-parts":[[2023,6,27]]},"location":"Ohrid, North Macedonia","end":{"date-parts":[[2023,6,29]]}},"container-title":["2023 30th International Conference on Systems, Signals and Image Processing (IWSSIP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10180201\/10180228\/10180264.pdf?arnumber=10180264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T17:44:18Z","timestamp":1691430258000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10180264\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,27]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/iwssip58668.2023.10180264","relation":{},"subject":[],"published":{"date-parts":[[2023,6,27]]}}}