iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.openalex.org/works/doi:10.1186/S42400-022-00132-X
{"id":"https://openalex.org/W4300716190","doi":"https://doi.org/10.1186/s42400-022-00132-x","title":"Valet attack on privacy: a cybersecurity threat in automotive Bluetooth infotainment systems","display_name":"Valet attack on privacy: a cybersecurity threat in automotive Bluetooth infotainment systems","publication_year":2022,"publication_date":"2022-10-04","ids":{"openalex":"https://openalex.org/W4300716190","doi":"https://doi.org/10.1186/s42400-022-00132-x"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-022-00132-x","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-022-00132-x","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-022-00132-x","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012525654","display_name":"Vishnu Renganathan","orcid":"https://orcid.org/0000-0002-5786-6302"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Vishnu Renganathan","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031280652","display_name":"Ekim Yurtsever","orcid":"https://orcid.org/0000-0002-3103-6052"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ekim Yurtsever","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038043931","display_name":"Qadeer Ahmed","orcid":null},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qadeer Ahmed","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039328157","display_name":"Aylin Yener","orcid":"https://orcid.org/0000-0003-0820-3390"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aylin Yener","raw_affiliation_strings":["Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5012525654"],"corresponding_institution_ids":["https://openalex.org/I52357470"],"apc_list":{"value":0,"currency":"USD","value_usd":0,"provenance":"doaj"},"apc_paid":null,"fwci":2.857,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":14,"citation_normalized_percentile":{"value":0.75571,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":95},"biblio":{"volume":"5","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12801","display_name":"Bluetooth Low Energy Technology Overview and Evaluation","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12801","display_name":"Bluetooth Low Energy Technology Overview and Evaluation","score":0.9991,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Delay-Tolerant Networking in Mobile Ad Hoc Networks","score":0.9935,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Characterization and Detection of Android Malware","score":0.9884,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5628719},{"id":"https://openalex.org/keywords/device-discovery","display_name":"Device Discovery","score":0.51464},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security Analysis","score":0.507048}],"concepts":[{"id":"https://openalex.org/C546215728","wikidata":"https://www.wikidata.org/wiki/Q39531","display_name":"Bluetooth","level":3,"score":0.82817924},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.70268846},{"id":"https://openalex.org/C526921623","wikidata":"https://www.wikidata.org/wiki/Q190117","display_name":"Automotive industry","level":2,"score":0.63254064},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5664198},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5628719},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.53743756},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.26093993},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.160389},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10960737},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-022-00132-x","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-022-00132-x","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/066fb311dddd498b9e071f055fea01bb","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-022-00132-x","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-022-00132-x","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":34,"referenced_works":["https://openalex.org/W1542413315","https://openalex.org/W1972642098","https://openalex.org/W2018362551","https://openalex.org/W2018956134","https://openalex.org/W2020083638","https://openalex.org/W2033811191","https://openalex.org/W2037180992","https://openalex.org/W2051986607","https://openalex.org/W2060692877","https://openalex.org/W2069273735","https://openalex.org/W2077937403","https://openalex.org/W2097457752","https://openalex.org/W2492039822","https://openalex.org/W2519585730","https://openalex.org/W2592391525","https://openalex.org/W2595837082","https://openalex.org/W2597359148","https://openalex.org/W2735515908","https://openalex.org/W2758168072","https://openalex.org/W2798140685","https://openalex.org/W2885982780","https://openalex.org/W2904405145","https://openalex.org/W2924742241","https://openalex.org/W3015314850","https://openalex.org/W3101650149","https://openalex.org/W3102158160","https://openalex.org/W3153757948","https://openalex.org/W3178268869","https://openalex.org/W32117899","https://openalex.org/W4234158408","https://openalex.org/W4281385724","https://openalex.org/W4281483395","https://openalex.org/W4283643738","https://openalex.org/W4287884591"],"related_works":["https://openalex.org/W4240288358","https://openalex.org/W4240241597","https://openalex.org/W4200107511","https://openalex.org/W3048799479","https://openalex.org/W3006507989","https://openalex.org/W2906845177","https://openalex.org/W2891427086","https://openalex.org/W2779961139","https://openalex.org/W2763500028","https://openalex.org/W1968625315"],"abstract_inverted_index":{"Abstract":[0],"Modern":[1],"automobiles":[2],"are":[3,168],"equipped":[4],"with":[5,27,49,71,112],"connectivity":[6,56],"features":[7],"to":[8,22,77,81,101,114,135,161,170,206],"enhance":[9],"the":[10,34,38,42,45,69,93,109,118,121,137,151,156,186,194],"user\u2019s":[11],"comfort.":[12],"Bluetooth":[13,94,176],"is":[14,20,74],"one":[15],"such":[16,55],"communication":[17],"technology":[18],"that":[19],"used":[21],"pair":[23],"a":[24,58,89,126,148,190],"personal":[25,39,82],"device":[26],"an":[28,65,97,198],"automotive":[29,46,98,180],"infotainment":[30,99,181],"unit.":[31],"Upon":[32],"pairing,":[33],"user":[35],"could":[36],"access":[37,80],"information":[40],"on":[41,175,179,193],"phone":[43],"through":[44,125],"head":[47],"unit":[48,100],"minimum":[50],"distraction":[51],"while":[52],"driving.":[53],"However,":[54],"introduces":[57],"possibility":[59],"for":[60,145],"privacy":[61,72,115,191],"attacks.":[62],"Hence,":[63],"performing":[64,189],"in-depth":[66],"analysis":[67,91,153],"of":[68,92,96,117,123,150],"system":[70,196],"constraints":[73,116],"extremely":[75],"important":[76],"prevent":[78,136],"unauthorized":[79],"information.":[83],"In":[84],"this":[85],"work,":[86],"we":[87],"perform":[88,140],"systematic":[90,152],"network":[95],"exploit":[102],"security":[103],"and":[104,130,154,173,210],"privacy-related":[105],"vulnerabilities.":[106],"We":[107,139,183,201],"model":[108],"identified":[110,166],"threat":[111],"respect":[113],"system,":[119],"emphasize":[120],"severity":[122],"attacks":[124],"standardized":[127],"rating":[128],"metric":[129],"then":[131,184],"provide":[132],"potential":[133],"countermeasures":[134],"attack.":[138],"System":[141,160],"Theoretic":[142],"Process":[143],"Analysis":[144],"Privacy":[146],"as":[147],"part":[149],"use":[155,202],"Common":[157],"Vulnerability":[158],"Scoring":[159],"derive":[162],"attack":[163,192],"severity.":[164],"The":[165],"vulnerabilities":[167],"due":[169],"design":[171],"flaws":[172],"assumptions":[174],"protocol":[177],"implementation":[178],"systems.":[182],"elicit":[185],"vulnerability":[187],"by":[188],"Automotive":[195],"in":[197],"actual":[199],"vehicle.":[200],"Android":[203],"Open-Source":[204],"Project":[205],"report":[207],"our":[208],"findings":[209],"propose":[211],"defense":[212],"strategies.":[213]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4300716190","counts_by_year":[{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":7}],"updated_date":"2024-10-30T12:57:45.596929","created_date":"2022-10-04"}