Automatic speaker verification, zigbee and LoRaWAn: Potential threats and vulnerabilities in smart cities

3Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

While smart cities are becoming continuously connected, various protocol and audio interfaces are widely deployed without the full cognizance of the underlying security vulnerabilities involved. Automatic Speaker Verification (ASV), LoRaWan and Zigbee protocols have been adopted and deployed across the existing infrastructure of smart cities. Such protocols among others form the basis of the Personal Area Networks (PANs) and given the fact that such protocols are embedded in the physical devices along with the high number of such devices makes it extremely difficult to update or replace such devices once certain vulnerabilities are discovered. This paper presents an overview of the technologies and examines the security vulnerability of ASV, ZigBee and LoRaWan. While some of the vulnerabilities might be specific to certain technologies, majority of the vulnerabilities apply to other protocols in the PAN landscape.

Cite

CITATION STYLE

APA

Rajput, A. E., Brahimi, T., & Sarirete, A. (2019). Automatic speaker verification, zigbee and LoRaWAn: Potential threats and vulnerabilities in smart cities. In Springer Proceedings in Complexity (pp. 277–285). Springer. https://doi.org/10.1007/978-3-030-30809-4_26

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free