-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathiscas.html
More file actions
98 lines (88 loc) · 3.11 KB
/
iscas.html
File metadata and controls
98 lines (88 loc) · 3.11 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0"/>
<title>ISCAS 2025 – Mohammad Alhussan</title>
<style>
body {
font-family: Arial, sans-serif;
background-color: #f3f3f3;
line-height: 1.6;
margin: 0;
padding: 40px 20px;
}
.container {
max-width: 900px;
margin: auto;
background-color: #ffffff;
padding: 30px;
border-radius: 8px;
box-shadow: 0 0 10px rgba(0,0,0,0.1);
}
h1, h2 {
text-align: center;
color: #2c3e50;
}
h3 {
color: #34495e;
margin-top: 30px;
}
p, li {
color: #2c3e50;
}
img {
width: 50%;
max-width: 600px;
display: block;
margin: 0 auto 10px auto;
}
ul {
padding-left: 20px;
}
a {
color: #007ACC;
text-decoration: none;
}
a:hover {
text-decoration: underline;
}
em {
color: #555;
font-size: 0.95em;
}
</style>
</head>
<body>
<div class="container">
<h1>ISCAS 2025 Conference Paper</h1>
<h2>Hacking Health: Unveiling Vulnerabilities in BLE-Enabled Wearable Sensor Nodes</h2>
<p><strong>Authors:</strong> Mohammad Alhussan, Francesca Boem, Sara Ghoreishizadeh, Anna Maria Mandalari</p>
<p><strong>Conference:</strong> 2025 IEEE International Symposium on Circuits and Systems (ISCAS)</p>
<p><strong>Date:</strong> May 25–28, 2025</p>
<p><strong>Location:</strong> London, United Kingdom</p>
<img src="/ISCAS_images/3.png" alt="ISCAS 2025 presentation" style="width: 100%; display: block; margin: 0 auto;" />
<p style="text-align: center;"><em>BLE Sniffing & MITM Execution Process.</em></p>
<h3>Overview</h3>
<p>
The rise of the Internet of Medical Things (IoMT) in healthcare brings benefits like continuous monitoring, remote patient care, and data-driven treatments. However, it also poses cybersecurity risks. While prior research has investigated this issue, it has not looked at advanced wearable sensor nodes that use Bluetooth Low Energy (BLE) alongside other wireless protocols.
</p>
<p>
In this work, we conduct a black-box audit of wearable sensor nodes to explore vulnerabilities. Our systematic approach:
</p>
<ul>
<li>Investigates whether common attacks are effective against BLE-enabled sensor nodes.</li>
<li>Groups vulnerabilities based on susceptibility to MITM, sniffing, and DoS threats.</li>
<li>Provides an in-depth security gap analysis for commercial devices used in an IoMT setting.</li>
</ul>
<p>
We present results from hundreds of experiments using popular commercial sensor nodes, showing that not only are these devices vulnerable to common attacks, but their weaknesses also pose threats to patient safety and data integrity.
</p>
<h3>Resources</h3>
<ul>
<li><em>Paper link to be provided soon</em></li>
<li><a href="images/pdfs/ISCAS Template Presentation (Final) - Updated - pdf.pdf" target="_blank">View Paper Presentation (pdf)</a></li>
</ul>
</div>
</body>
</html>