{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:57:29Z","timestamp":1773511049488,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T00:00:00Z","timestamp":1561939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1145\/3341325.3342000","type":"proceedings-article","created":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T13:04:52Z","timestamp":1567775092000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Exploiting Bluetooth Vulnerabilities in e-Health IoT Devices"],"prefix":"10.1145","author":[{"given":"Mohammed","family":"Zubair","sequence":"first","affiliation":[{"name":"Qatar University, Doha, Qatar"}]},{"given":"Devrim","family":"Unal","sequence":"additional","affiliation":[{"name":"Qatar University, Doha, Qatar"}]},{"given":"Abdulla","family":"Al-Ali","sequence":"additional","affiliation":[{"name":"Qatar University, Doha, Qatar"}]},{"given":"Abdullatif","family":"Shikfa","sequence":"additional","affiliation":[{"name":"Qatar University, Doha, Qatar"}]}],"member":"320","published-online":{"date-parts":[[2019,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"International Journal of engineering Research and Applications 1, 5","author":"Abdul-Qawy Antar Shaddad","year":"2015","unstructured":"Antar Shaddad Abdul-Qawy , PJ Pramod , E Magesh , and T Srinivasulu . 2015. The Internet of Things (IoT): An Overview . International Journal of engineering Research and Applications 1, 5 ( 2015 ), 71--82. Antar Shaddad Abdul-Qawy, PJ Pramod, E Magesh, and T Srinivasulu. 2015. The Internet of Things (IoT): An Overview. International Journal of engineering Research and Applications 1, 5 (2015), 71--82."},{"key":"e_1_3_2_1_2_1","volume-title":"Capturing Bluetooth Traffic in the Wild: Practical Systems and Privacy Implications","author":"Albazrqaoe Wahhab","unstructured":"Wahhab Albazrqaoe . 2018. Capturing Bluetooth Traffic in the Wild: Practical Systems and Privacy Implications . Michigan State University . Computer Science. Wahhab Albazrqaoe. 2018. Capturing Bluetooth Traffic in the Wild: Practical Systems and Privacy Implications. Michigan State University. Computer Science."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2880970"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.359"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.968817"},{"key":"e_1_3_2_1_6_1","volume-title":"Specification of the Bluetooth System","author":"Bluetooth SIG","unstructured":"SIG Bluetooth . 2001. Specification of the Bluetooth System , Volume 1 , Core. Version 1.1. SIG Bluetooth. 2001. Specification of the Bluetooth System, Volume 1, Core. Version 1.1."},{"key":"e_1_3_2_1_7_1","volume-title":"Specification of the Bluetooth System","author":"Bluetooth SIG","unstructured":"SIG Bluetooth . 2001. Specification of the Bluetooth System , Volume 2 , Profiles. Version 1.1. SIG Bluetooth. 2001. Specification of the Bluetooth System, Volume 2, Profiles. Version 1.1."},{"key":"e_1_3_2_1_8_1","volume-title":"Traffic Integration in Personal, Local, and Geographical Wireless Networks. Handbook of Wireless Networks and Mobile Computing","author":"Bruno Raffaele","year":"2002","unstructured":"Raffaele Bruno , Marco Conti , and Enrico Gregori . 2002. Traffic Integration in Personal, Local, and Geographical Wireless Networks. Handbook of Wireless Networks and Mobile Computing ( 2002 ), 145. Raffaele Bruno, Marco Conti, and Enrico Gregori. 2002. Traffic Integration in Personal, Local, and Geographical Wireless Networks. Handbook of Wireless Networks and Mobile Computing (2002), 145."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868416"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCWC.2017.7868416"},{"key":"e_1_3_2_1_12_1","volume-title":"Bluetooth-The universal radio interface for ad hoc, wireless connectivity. Ericsson review 3, 1","author":"Haartsen Jaap","year":"1998","unstructured":"Jaap Haartsen . 1998. Bluetooth-The universal radio interface for ad hoc, wireless connectivity. Ericsson review 3, 1 ( 1998 ), 110--117. Jaap Haartsen. 1998. Bluetooth-The universal radio interface for ad hoc, wireless connectivity. Ericsson review 3, 1 (1998), 110--117."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321400.1321402"},{"key":"e_1_3_2_1_14_1","volume-title":"Wiley Encyclopedia of Telecommunications (2003).","author":"Haartsen Jaap C","unstructured":"Jaap C Haartsen . 2003. Bluetooth radio system . Wiley Encyclopedia of Telecommunications (2003). Jaap C Haartsen. 2003. Bluetooth radio system. Wiley Encyclopedia of Telecommunications (2003)."},{"key":"e_1_3_2_1_15_1","volume-title":"Communication, Control, and Management","author":"Liu Yanxia","unstructured":"Yanxia Liu , Shufen Li , and Liting Cao . 2009. Application of bluetooth communication in digital photo frame. In 2009 ISECS International Colloquium on Computing , Communication, Control, and Management , Vol. 4 . IEEE , 370--373. Yanxia Liu, Shufen Li, and Liting Cao. 2009. Application of bluetooth communication in digital photo frame. In 2009 ISECS International Colloquium on Computing, Communication, Control, and Management, Vol. 4. IEEE, 370--373."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.3390\/jsan7030028"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3390\/jsan7030028"},{"key":"e_1_3_2_1_18_1","volume-title":"Bluetooth revealed: the insider's guide to an open specification for global wireless communication","author":"Miller Brent A","unstructured":"Brent A Miller and Chatschik Bisdikian . 2001. Bluetooth revealed: the insider's guide to an open specification for global wireless communication . Prentice Hall PTR. Brent A Miller and Chatschik Bisdikian. 2001. Bluetooth revealed: the insider's guide to an open specification for global wireless communication. Prentice Hall PTR."},{"key":"e_1_3_2_1_19_1","first-page":"1","article-title":"Towards a definition of the Internet of Things (IoT)","volume":"1","author":"Minerva Roberto","year":"2015","unstructured":"Roberto Minerva , Abyi Biru , and Domenico Rotondi . 2015 . Towards a definition of the Internet of Things (IoT) . IEEE Internet Initiative 1 (2015), 1 -- 86 . Roberto Minerva, Abyi Biru, and Domenico Rotondi. 2015. Towards a definition of the Internet of Things (IoT). IEEE Internet Initiative 1 (2015), 1--86.","journal-title":"IEEE Internet Initiative"},{"key":"e_1_3_2_1_20_1","volume-title":"Security threats analysis in Bluetooth-enabled mobile devices. arXiv preprint arXiv:1206.1482","author":"Nasim Robayet","year":"2012","unstructured":"Robayet Nasim . 2012. Security threats analysis in Bluetooth-enabled mobile devices. arXiv preprint arXiv:1206.1482 ( 2012 ). Robayet Nasim. 2012. Security threats analysis in Bluetooth-enabled mobile devices. arXiv preprint arXiv:1206.1482 (2012)."},{"key":"e_1_3_2_1_21_1","volume-title":"The Evolution of Bluetooth\u00ae in Wireless Medical Devices. Socket Mobile","author":"Ott Len","year":"2010","unstructured":"Len Ott . 2010. The Evolution of Bluetooth\u00ae in Wireless Medical Devices. Socket Mobile , Inc. White Papers ( 2010 ). Len Ott. 2010. The Evolution of Bluetooth\u00ae in Wireless Medical Devices. Socket Mobile, Inc. White Papers (2010)."},{"key":"e_1_3_2_1_22_1","first-page":"352","article-title":"Method and system for establishing a wireless communications link","volume":"7","author":"Palin Arto","year":"2008","unstructured":"Arto Palin , Juha Salokannel , and Jukka Reunamaki . 2008 . Method and system for establishing a wireless communications link . US Patent 7 , 352 ,998. Arto Palin, Juha Salokannel, and Jukka Reunamaki. 2008. Method and system for establishing a wireless communications link. US Patent 7,352,998.","journal-title":"US Patent"},{"key":"e_1_3_2_1_23_1","volume-title":"Bluetooth hacking and its Prevention. L & T Technology Services. Available online: http:\/\/www.larsentoubro.com\/media\/27618\/bluetooth-hacking-and-its-prevention-2014.pdf (accessed on","author":"Pandey Trapti","year":"2016","unstructured":"Trapti Pandey and Pratha Khare . 2017. Bluetooth hacking and its Prevention. L & T Technology Services. Available online: http:\/\/www.larsentoubro.com\/media\/27618\/bluetooth-hacking-and-its-prevention-2014.pdf (accessed on 1 April 2016 ) (2017). Trapti Pandey and Pratha Khare. 2017. Bluetooth hacking and its Prevention. L & T Technology Services. Available online: http:\/\/www.larsentoubro.com\/media\/27618\/bluetooth-hacking-and-its-prevention-2014.pdf (accessed on 1 April 2016) (2017)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/963508"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.007"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.05.007"},{"key":"e_1_3_2_1_27_1","volume-title":"Telecommunications Forum TELFOR","volume":"20","author":"Popovi\u00e6 DB","year":"2003","unstructured":"DB Popovi\u00e6 , D Bojani\u00e6 , N Jorgovanovi\u00e6 , S Dosen , and R Petrovi\u00e6 . 2003 . TeleECG based on Bluetooth transceivers . In Telecommunications Forum TELFOR , Vol. 20 . DB Popovi\u00e6, D Bojani\u00e6, N Jorgovanovi\u00e6, S Dosen, and R Petrovi\u00e6. 2003. TeleECG based on Bluetooth transceivers. In Telecommunications Forum TELFOR, Vol. 20."},{"key":"e_1_3_2_1_28_1","first-page":"333","article-title":"Bluetooth security analysis and solution","volume":"6","author":"Muhammed Rijah UL","year":"2016","unstructured":"UL Muhammed Rijah , S Mosharani , S Amuthapriya , MMM Mufthas , Malikberdi Hezretov , and Dhishan Dhammearatchi . 2016 . Bluetooth security analysis and solution . International Journal of Scientific and Research Publications 6 , 4 (2016), 333 -- 338 . UL Muhammed Rijah, S Mosharani, S Amuthapriya, MMM Mufthas, Malikberdi Hezretov, and Dhishan Dhammearatchi. 2016. Bluetooth security analysis and solution. International Journal of Scientific and Research Publications 6, 4 (2016), 333--338.","journal-title":"International Journal of Scientific and Research Publications"},{"key":"e_1_3_2_1_29_1","first-page":"44","article-title":"BLUETOOTH: THE FUTURE OF WIRELESS TECHNOLOGY","volume":"24","author":"Saltzstein William E","year":"2002","unstructured":"William E Saltzstein . 2002 . BLUETOOTH: THE FUTURE OF WIRELESS TECHNOLOGY ? MEDICAL DEVICE AND DIAGNOSTIC INDUSTRY 24 , 2 (2002), 44 -- 53 . William E Saltzstein. 2002. BLUETOOTH: THE FUTURE OF WIRELESS TECHNOLOGY? MEDICAL DEVICE AND DIAGNOSTIC INDUSTRY 24, 2 (2002), 44--53.","journal-title":"MEDICAL DEVICE AND DIAGNOSTIC INDUSTRY"},{"key":"e_1_3_2_1_30_1","volume-title":"Cybersecurity Issues in Implanted Medical Devices. In 2018 International Conference on Computer and Applications (ICCA). IEEE, 1--9.","author":"Tabasum Aliya","year":"2018","unstructured":"Aliya Tabasum , Zeineb Safi , Wadha AlKhater , and Abdullatif Shikfa . 2018 . Cybersecurity Issues in Implanted Medical Devices. In 2018 International Conference on Computer and Applications (ICCA). IEEE, 1--9. Aliya Tabasum, Zeineb Safi, Wadha AlKhater, and Abdullatif Shikfa. 2018. Cybersecurity Issues in Implanted Medical Devices. In 2018 International Conference on Computer and Applications (ICCA). IEEE, 1--9."},{"key":"e_1_3_2_1_31_1","first-page":"4597","article-title":"IoT wireless home automation technologies and their relation to specific absorption rate","volume":"96","author":"Turab NIDAL M","year":"2018","unstructured":"NIDAL M Turab . 2018 . IoT wireless home automation technologies and their relation to specific absorption rate . Journal of Theoretical and Applied Information Technology 96 , 14 (2018), 4597 -- 4609 . NIDAL M Turab. 2018. IoT wireless home automation technologies and their relation to specific absorption rate. Journal of Theoretical and Applied Information Technology 96, 14 (2018), 4597--4609.","journal-title":"Journal of Theoretical and Applied Information Technology"},{"key":"e_1_3_2_1_32_1","unstructured":"Lih Wern Wong. 2005. Potential Bluetooth Vulnerabilities in Smartphones. In AISM. Citeseer 123--132.  Lih Wern Wong. 2005. Potential Bluetooth Vulnerabilities in Smartphones. In AISM. Citeseer 123--132."}],"event":{"name":"ICFNDS '19: 3rd International Conference on Future Networks and Distributed Systems","location":"Paris France","acronym":"ICFNDS '19","sponsor":["CNAM Conservatoire des Arts et M\u00e9tiers"]},"container-title":["Proceedings of the 3rd International Conference on Future Networks and Distributed Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342000","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341325.3342000","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:57Z","timestamp":1750201977000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341325.3342000"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7]]},"references-count":31,"alternative-id":["10.1145\/3341325.3342000","10.1145\/3341325"],"URL":"https:\/\/doi.org\/10.1145\/3341325.3342000","relation":{},"subject":[],"published":{"date-parts":[[2019,7]]},"assertion":[{"value":"2019-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}