{"id":"https://openalex.org/W4403391084","doi":"https://doi.org/10.1109/iotsms62296.2024.10710245","title":"Security-Bag: A Specification-based Intrusion Detection System Applied to Star Topology BLE Networks","display_name":"Security-Bag: A Specification-based Intrusion Detection System Applied to Star Topology BLE Networks","publication_year":2024,"publication_date":"2024-09-02","ids":{"openalex":"https://openalex.org/W4403391084","doi":"https://doi.org/10.1109/iotsms62296.2024.10710245"},"language":"en","primary_location":{"id":"doi:10.1109/iotsms62296.2024.10710245","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iotsms62296.2024.10710245","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://hal.science/hal-04830222/document","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091875850","display_name":"Mohammad Beyrouti","orcid":"https://orcid.org/0009-0008-1236-2419"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I102516824","display_name":"Universit\u00e9 de Technologie de Compi\u00e8gne","ror":"https://ror.org/04y5kwa70","country_code":"FR","type":"education","lineage":["https://openalex.org/I102516824"]},{"id":"https://openalex.org/I39804081","display_name":"Sorbonne Universit\u00e9","ror":"https://ror.org/02en5vm52","country_code":"FR","type":"education","lineage":["https://openalex.org/I39804081"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Mohammad Beyrouti","raw_affiliation_strings":["Universit&#x00E9; de Technologie de Compi&#x00E8;gne, CNRS, Alliance Sorbonne Universit&#x00E9;, Heudiasyc,Compi&#x00E8;gne,France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; de Technologie de Compi&#x00E8;gne, CNRS, Alliance Sorbonne Universit&#x00E9;, Heudiasyc,Compi&#x00E8;gne,France","institution_ids":["https://openalex.org/I102516824","https://openalex.org/I39804081","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082545290","display_name":"Ahmed Lounis","orcid":"https://orcid.org/0009-0000-6632-4540"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I102516824","display_name":"Universit\u00e9 de Technologie de Compi\u00e8gne","ror":"https://ror.org/04y5kwa70","country_code":"FR","type":"education","lineage":["https://openalex.org/I102516824"]},{"id":"https://openalex.org/I39804081","display_name":"Sorbonne Universit\u00e9","ror":"https://ror.org/02en5vm52","country_code":"FR","type":"education","lineage":["https://openalex.org/I39804081"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Ahmed Lounis","raw_affiliation_strings":["Universit&#x00E9; de Technologie de Compi&#x00E8;gne, CNRS, Alliance Sorbonne Universit&#x00E9;, Heudiasyc,Compi&#x00E8;gne,France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; de Technologie de Compi&#x00E8;gne, CNRS, Alliance Sorbonne Universit&#x00E9;, Heudiasyc,Compi&#x00E8;gne,France","institution_ids":["https://openalex.org/I102516824","https://openalex.org/I39804081","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005800419","display_name":"Benjamin Lussier","orcid":"https://orcid.org/0000-0002-6657-5531"},"institutions":[{"id":"https://openalex.org/I39804081","display_name":"Sorbonne Universit\u00e9","ror":"https://ror.org/02en5vm52","country_code":"FR","type":"education","lineage":["https://openalex.org/I39804081"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I102516824","display_name":"Universit\u00e9 de Technologie de Compi\u00e8gne","ror":"https://ror.org/04y5kwa70","country_code":"FR","type":"education","lineage":["https://openalex.org/I102516824"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Benjamin Lussier","raw_affiliation_strings":["Universit&#x00E9; de Technologie de Compi&#x00E8;gne, CNRS, Alliance Sorbonne Universit&#x00E9;, Heudiasyc,Compi&#x00E8;gne,France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; de Technologie de Compi&#x00E8;gne, CNRS, Alliance Sorbonne Universit&#x00E9;, Heudiasyc,Compi&#x00E8;gne,France","institution_ids":["https://openalex.org/I102516824","https://openalex.org/I39804081","https://openalex.org/I1294671590"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108085596","display_name":"Abdelmadjid Bouabdallah","orcid":null},"institutions":[{"id":"https://openalex.org/I102516824","display_name":"Universit\u00e9 de Technologie de Compi\u00e8gne","ror":"https://ror.org/04y5kwa70","country_code":"FR","type":"education","lineage":["https://openalex.org/I102516824"]},{"id":"https://openalex.org/I39804081","display_name":"Sorbonne Universit\u00e9","ror":"https://ror.org/02en5vm52","country_code":"FR","type":"education","lineage":["https://openalex.org/I39804081"]},{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"funder","lineage":["https://openalex.org/I1294671590"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Abdelmadjid Bouabdallah","raw_affiliation_strings":["Universit&#x00E9; de Technologie de Compi&#x00E8;gne, CNRS, Alliance Sorbonne Universit&#x00E9;, Heudiasyc,Compi&#x00E8;gne,France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Universit&#x00E9; de Technologie de Compi&#x00E8;gne, CNRS, Alliance Sorbonne Universit&#x00E9;, Heudiasyc,Compi&#x00E8;gne,France","institution_ids":["https://openalex.org/I102516824","https://openalex.org/I39804081","https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000209596","display_name":"Abed Ellatif Samhat","orcid":"https://orcid.org/0000-0002-1137-621X"},"institutions":[{"id":"https://openalex.org/I160368002","display_name":"Lebanese University","ror":"https://ror.org/05x6qnc69","country_code":"LB","type":"education","lineage":["https://openalex.org/I160368002"]}],"countries":["LB"],"is_corresponding":false,"raw_author_name":"Abed Ellatif Samhat","raw_affiliation_strings":["Lebanese University,Faculty of Engineering-CRSI"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Lebanese University,Faculty of Engineering-CRSI","institution_ids":["https://openalex.org/I160368002"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5091875850"],"corresponding_institution_ids":["https://openalex.org/I102516824","https://openalex.org/I1294671590","https://openalex.org/I39804081"],"apc_list":null,"apc_paid":null,"fwci":0.3297,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.61125115,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"169","last_page":"176"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9764000177383423,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6901882886886597},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6291902661323547},{"id":"https://openalex.org/keywords/star","display_name":"Star (game theory)","score":0.6005892157554626},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.5583154559135437},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.5123963952064514},{"id":"https://openalex.org/keywords/star-network","display_name":"Star network","score":0.45992714166641235},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4069581925868988},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2711585760116577},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.13453465700149536},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.10501405596733093},{"id":"https://openalex.org/keywords/astrophysics","display_name":"Astrophysics","score":0.07301348447799683},{"id":"https://openalex.org/keywords/electrical-engineering","display_name":"Electrical engineering","score":0.0644436776638031}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6901882886886597},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6291902661323547},{"id":"https://openalex.org/C2780897414","wikidata":"https://www.wikidata.org/wiki/Q7600592","display_name":"Star (game theory)","level":2,"score":0.6005892157554626},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.5583154559135437},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.5123963952064514},{"id":"https://openalex.org/C71976206","wikidata":"https://www.wikidata.org/wiki/Q841749","display_name":"Star network","level":4,"score":0.45992714166641235},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4069581925868988},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2711585760116577},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.13453465700149536},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.10501405596733093},{"id":"https://openalex.org/C44870925","wikidata":"https://www.wikidata.org/wiki/Q37547","display_name":"Astrophysics","level":1,"score":0.07301348447799683},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0644436776638031},{"id":"https://openalex.org/C122306262","wikidata":"https://www.wikidata.org/wiki/Q719775","display_name":"Ring network","level":3,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/iotsms62296.2024.10710245","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iotsms62296.2024.10710245","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-04830222v1","is_oa":true,"landing_page_url":"https://hal.science/hal-04830222v1/file/Camera-ready%20version%20IoTSMS.pdf","pdf_url":"https://hal.science/hal-04830222/document","source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2024), Sep 2024, Malm\u00f6, Sweden. pp.169-176, &#x27E8;10.1109/IOTSMS62296.2024.10710245&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-04830222v1","is_oa":true,"landing_page_url":"https://hal.science/hal-04830222v1/file/Camera-ready%20version%20IoTSMS.pdf","pdf_url":"https://hal.science/hal-04830222/document","source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"11th International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2024), Sep 2024, Malm\u00f6, Sweden. pp.169-176, &#x27E8;10.1109/IOTSMS62296.2024.10710245&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334800","display_name":"Research Committee, Aristotle University of Thessaloniki","ror":"https://ror.org/02j61yw88"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4403391084.pdf"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W2011778831","https://openalex.org/W2734941459","https://openalex.org/W2899682091","https://openalex.org/W2900570802","https://openalex.org/W2903781571","https://openalex.org/W2980608295","https://openalex.org/W3009020499","https://openalex.org/W3102209554","https://openalex.org/W3132669406","https://openalex.org/W3171733056","https://openalex.org/W3171997861","https://openalex.org/W3181243382","https://openalex.org/W4214870320","https://openalex.org/W4225147756","https://openalex.org/W4319310775","https://openalex.org/W4362496497","https://openalex.org/W4380354694","https://openalex.org/W4399196495","https://openalex.org/W6756158088","https://openalex.org/W6780211247","https://openalex.org/W6784728542"],"related_works":["https://openalex.org/W2168161310","https://openalex.org/W312357535","https://openalex.org/W3174620033","https://openalex.org/W2185219542","https://openalex.org/W2135350801","https://openalex.org/W3193921852","https://openalex.org/W2131337854","https://openalex.org/W3160213241","https://openalex.org/W2204396763","https://openalex.org/W2065695225"],"abstract_inverted_index":{"Bluetooth":[0],"Low":[1],"Energy":[2],"(BLE),":[3],"a":[4,126,154],"protocol":[5],"widely":[6],"used":[7],"in":[8,92,114,186],"IoT":[9,52],"applications,":[10],"enables":[11],"efficient":[12],"data":[13],"exchange":[14],"with":[15,29],"low-cost,":[16],"resource-constrained":[17],"devices.":[18],"Unfortunately,":[19],"BLE\u2019s":[20],"numerous":[21],"vulnerabilities":[22],"and":[23,49,74,89,110,184],"poor":[24],"vendor":[25],"patching":[26],"policies,":[27],"combined":[28],"the":[30,47,56,100,122,141,159,168,173],"lack":[31],"of":[32,51,103],"seamless":[33],"update":[34],"mechanisms":[35],"for":[36,58,178],"BLE":[37,70,104,133,142,155],"devices,":[38,105],"expose":[39],"these":[40],"systems":[41,67],"to":[42,99,130],"various":[43],"wireless":[44,182],"attacks,":[45],"jeopardizing":[46],"safety":[48],"security":[50,137],"applications.":[53],"This":[54],"underscores":[55],"need":[57],"an":[59],"Intrusion":[60],"Detection":[61],"System":[62],"(IDS).":[63],"However,":[64],"IPbased":[65],"IDS":[66,77,128],"have":[68],"limited":[69],"attack":[71,93],"detection":[72],"scope,":[73],"existing":[75],"BLE-specific":[76],"solutions,":[78],"particularly":[79],"those":[80],"using":[81,158],"unreliable,":[82],"Received":[83],"Signal":[84],"Strength":[85],"Indication":[86],"(RSSI)-dependent":[87],"sniffers/probes":[88],"static":[90],"thresholds":[91],"detection,":[94],"suffer":[95],"from":[96,140],"limitations":[97],"due":[98],"dynamic":[101],"aspects":[102],"such":[106],"as":[107],"device":[108],"mobility":[109],"connection":[111],"parameters":[112],"update,":[113],"their":[115],"designs.":[116],"In":[117],"this":[118,146],"paper,":[119],"we":[120],"propose":[121],"Security":[123,147,169],"Bag":[124,148,170],"component:":[125],"specification-based":[127],"applied":[129],"star":[131],"topology":[132],"networks":[134,183],"that":[135,167],"implements":[136],"rules":[138],"derived":[139],"specifications.":[143],"We":[144],"validate":[145],"by":[149],"simulating":[150],"spoofing":[151],"attacks":[152],"on":[153,180],"sensor":[156],"node":[157],"Contiki":[160],"Cooja":[161],"simulator.":[162],"The":[163],"obtained":[164],"results":[165],"show":[166],"promptly":[171],"detects":[172],"injected":[174],"attack,":[175],"opening":[176],"avenues":[177],"applications":[179],"other":[181],"deployment":[185],"real":[187],"systems.":[188]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-07T13:39:58.223016","created_date":"2025-10-10T00:00:00"}
