{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:37:23Z","timestamp":1753601843261,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,11]],"date-time":"2019-11-11T00:00:00Z","timestamp":1573430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,11]]},"DOI":"10.1145\/3338500.3360334","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T19:43:22Z","timestamp":1573155802000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Toxic Friends in Your Network"],"prefix":"10.1145","author":[{"given":"Flor","family":"\u00c1lvarez","sequence":"first","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Lars","family":"Almon","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Ann-Sophie","family":"Hahn","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[{"name":"TU Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,11,11]]},"reference":[{"volume-title":"Hardware Security Threats Against Bluetooth Mesh Networks. In International Workshop on Attacks and Defenses for Internet-of-Things (ADIoT) (CNS). IEEE, 1--9.","year":"2018","author":"Adomnicai Alexandre","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN44214.2019.8990765"},{"volume-title":"Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited. In 42nd Conference on Local Computer Networks (LCN).","year":"2017","author":"Almon Lars","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/GHTC46095.2019.9033063"},{"volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Antonioli Daniele","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","unstructured":"Eli Biham and Lior Neumann. 2018. Breaking the Bluetooth Pairing--Fixed Coordinate Invalid Curve Attack. Technion--Israel Institute of Technology. Available: https:\/\/www. cs. technion. ac. il\/ biham\/BT\/bt-fixed-coordinate-invalid-curve-attack. pdf (2018).  Eli Biham and Lior Neumann. 2018. Breaking the Bluetooth Pairing--Fixed Coordinate Invalid Curve Attack. Technion--Israel Institute of Technology. Available: https:\/\/www. cs. technion. ac. il\/ biham\/BT\/bt-fixed-coordinate-invalid-curve-attack. pdf (2018)."},{"key":"e_1_3_2_1_7_1","unstructured":"Bluetooth SIG. 2019 a. Bluetooth Core Specification 5.1 . https:\/\/www.bluetooth.com\/specifications\/bluetooth-core-specification.  Bluetooth SIG. 2019 a. Bluetooth Core Specification 5.1 . https:\/\/www.bluetooth.com\/specifications\/bluetooth-core-specification."},{"key":"e_1_3_2_1_8_1","unstructured":"Bluetooth SIG. 2019 b. Bluetooth Mesh Profile Specification 1.0.1 . https:\/\/www.bluetooth.com\/specifications\/mesh-specifications.  Bluetooth SIG. 2019 b. Bluetooth Mesh Profile Specification 1.0.1 . https:\/\/www.bluetooth.com\/specifications\/mesh-specifications."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAW.2005.1495974"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2516102"},{"key":"e_1_3_2_1_11_1","unstructured":"Damien Cauquil. 2018. You'd better secure your BLE devices or we'll kick your butts! DEF CON 26.  Damien Cauquil. 2018. You'd better secure your BLE devices or we'll kick your butts! DEF CON 26."},{"key":"e_1_3_2_1_12_1","unstructured":"Damien Cauquil. 2018. BtleJack: a new Bluetooth Low Energy swiss-army knife. https:\/\/github.com\/virtualabs\/btlejack.  Damien Cauquil. 2018. BtleJack: a new Bluetooth Low Energy swiss-army knife. https:\/\/github.com\/virtualabs\/btlejack."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19051238"},{"key":"e_1_3_2_1_14_1","unstructured":"F. \u00c1lvarez L. Almon A. Hahn M. Hollick. 2019. btlemesh. https:\/\/www.seemoo.de\/btlemesh  F. \u00c1lvarez L. Almon A. Hahn M. Hollick. 2019. btlemesh. https:\/\/www.seemoo.de\/btlemesh"},{"key":"e_1_3_2_1_15_1","unstructured":"Monsoon Solutions Inc. 2019. Monsoon Power Monitor. http:\/\/msoon.github.io\/powermonitor\/.  Monsoon Solutions Inc. 2019. Monsoon Power Monitor. http:\/\/msoon.github.io\/powermonitor\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2163881"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Neal Koblitz. 1987. Elliptic curve cryptosystems. Mathematics of computation Vol. 48 177 (1987) 203--209.  Neal Koblitz. 1987. Elliptic curve cryptosystems. Mathematics of computation Vol. 48 177 (1987) 203--209.","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813618"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOM.2004.1276868"},{"key":"e_1_3_2_1_20_1","unstructured":"Micro-bit Educational Foundation.2015. microbit. https:\/\/microbit.org\/guide\/features\/.  Micro-bit Educational Foundation.2015. microbit. https:\/\/microbit.org\/guide\/features\/."},{"volume-title":"Conference on the theory and application of cryptographic techniques. Springer, 417--426","year":"1985","author":"Miller Victor S","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911424"},{"key":"e_1_3_2_1_23_1","unstructured":"Nordic Semiconductor. 2019. Board nRF52 Development Kit. https:\/\/www.nordicsemi.com\/Software-and-Tools\/Development-Kits\/nRF52-DK.  Nordic Semiconductor. 2019. Board nRF52 Development Kit. https:\/\/www.nordicsemi.com\/Software-and-Tools\/Development-Kits\/nRF52-DK."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2008.6"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"e_1_3_2_1_26_1","unstructured":"Ruuvi Innovations Ltd (Oy). 2019. Ruuvitag. https:\/\/ruuvi.com\/ruuvitag-specs\/.  Ruuvi Innovations Ltd (Oy). 2019. Ruuvitag. https:\/\/ruuvi.com\/ruuvitag-specs\/."},{"volume-title":"Bluetooth: With Low Energy Comes Low Security. In 7th Workshop on Offensive Technologies. USENIX, Washington, D.C.","year":"2013","author":"Ryan Mike","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","unstructured":"Nordic Semiconductor. 2019. Online Power Profiler. http:\/\/devzone.nordicsemi.com\/nordic\/power.  Nordic Semiconductor. 2019. Online Power Profiler. http:\/\/devzone.nordicsemi.com\/nordic\/power."},{"key":"e_1_3_2_1_29_1","unstructured":"Ben Seri and Gregory Vishnepolsky. 2017. BlueBorne. Armis. [online] https:\/\/armis.com\/blueborne\/(2017).  Ben Seri and Gregory Vishnepolsky. 2017. BlueBorne. Armis. [online] https:\/\/armis.com\/blueborne\/(2017)."},{"volume-title":"Secure Outdoor Smart Parking Using Dual Mode Bluetooth Mesh Networks. In 89th Vehicular Technology Conference (VTC2019-Spring). IEEE, 1--7.","year":"2019","author":"Seymer Paul","key":"e_1_3_2_1_30_1"},{"volume-title":"Cracking the Bluetooth PIN. In 3rd International Conference on Mobile Systems, Applications, and Services (MobiSys '05)","year":"2005","author":"Shaked Yaniv","key":"e_1_3_2_1_31_1"},{"volume-title":"International workshop on security protocols. Springer, 172--182","year":"1999","author":"Stajano Frank","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","unstructured":"Adam Stubblefield John Ioannidis Aviel D Rubin et almbox. 2002. Using the Fluhrer Mantin and Shamir Attack to Break WEP. In NDSS.  Adam Stubblefield John Ioannidis Aviel D Rubin et almbox. 2002. Using the Fluhrer Mantin and Shamir Attack to Break WEP. In NDSS."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2016.7795499"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134027"},{"volume-title":"Dragonblood: Analyzing the Dragonfly Handshake of WPA3 and EAP-pwd. Cryptology ePrint Archive, Report 2019\/383. https:\/\/eprint.iacr.org\/2019\/383.","year":"2019","author":"Vanhoef Mathy","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.274"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Adonay A. Veiga and Claudia J. B. Abbas. 2019. Proposal and Application of Bluetooth Mesh Profile for Smart Cities Services. MDPI - Smart Cities (2019).  Adonay A. Veiga and Claudia J. B. Abbas. 2019. Proposal and Application of Bluetooth Mesh Profile for Smart Cities Services. MDPI - Smart Cities (2019).","DOI":"10.3390\/smartcities2010001"},{"key":"e_1_3_2_1_39_1","unstructured":"ZigBee Alliance Inc. 2016. Zigbee 3.0 Base Device Behavior Specification . https:\/\/zigbee.org\/zigbee-for-developers\/zigbee-3-0\/.  ZigBee Alliance Inc. 2016. Zigbee 3.0 Base Device Behavior Specification . https:\/\/zigbee.org\/zigbee-for-developers\/zigbee-3-0\/."}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"London United Kingdom","acronym":"CCS '19"},"container-title":["Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338500.3360334","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338500.3360334","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:49Z","timestamp":1750201969000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338500.3360334"}},"subtitle":["Breaking the Bluetooth Mesh Friendship Concept"],"short-title":[],"issued":{"date-parts":[[2019,11,11]]},"references-count":39,"alternative-id":["10.1145\/3338500.3360334","10.1145\/3338500"],"URL":"https:\/\/doi.org\/10.1145\/3338500.3360334","relation":{},"subject":[],"published":{"date-parts":[[2019,11,11]]},"assertion":[{"value":"2019-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}