Neutralizing BLE Beacon-Based Electronic Attendance System Using Signal Imitation Attack


Journal article


Moonbeom Kim, Jongho Lee, Jeongyeup Paek
IEEE Access, vol. 6, 2018, pp. 77921--77930

DOI: https://ieeexplore.ieee.org/document/8555557

Cite

Cite

APA   Click to copy
Kim, M., Lee, J., & Paek, J. (2018). Neutralizing BLE Beacon-Based Electronic Attendance System Using Signal Imitation Attack. IEEE Access, 6, 77921–77930. https://doi.org/https://ieeexplore.ieee.org/document/8555557


Chicago/Turabian   Click to copy
Kim, Moonbeom, Jongho Lee, and Jeongyeup Paek. “Neutralizing BLE Beacon-Based Electronic Attendance System Using Signal Imitation Attack.” IEEE Access 6 (2018): 77921–77930.


MLA   Click to copy
Kim, Moonbeom, et al. “Neutralizing BLE Beacon-Based Electronic Attendance System Using Signal Imitation Attack.” IEEE Access, vol. 6, 2018, pp. 77921–30, doi:https://ieeexplore.ieee.org/document/8555557.


BibTeX   Click to copy

@article{kim2018a,
  title = {Neutralizing BLE Beacon-Based Electronic Attendance System Using Signal Imitation Attack},
  year = {2018},
  journal = {IEEE Access},
  pages = {77921--77930},
  volume = {6},
  doi = {https://ieeexplore.ieee.org/document/8555557},
  author = {Kim, Moonbeom and Lee, Jongho and Paek, Jeongyeup}
}





Follow this website


You need to create an Owlstown account to follow this website.


Sign up

Already an Owlstown member?

Log in