The research below has been published during my doctoral research at Boston University.
The research below has been published during my doctoral research at Boston University.
Becker, Johannes K
The Internet of Things (IoT) has seen exceptional adoption in recent years, resulting in an unprecedented level of connectivity in personal and industrial domains. In parallel, software-defined radio (SDR) technology has become increasingly powerful,…
May 2022
pdf urlBecker, Johannes K. and Starobinski, David
The plethora of Internet of Things (IoT) protocols and the upcoming availability of new spectrum bands for wirelessly connected devices have made software-defined radio (SDR) technology increasingly useful to interact with radio-based communication. …
October 2022
urlJohannes K. Becker and Stefan Gvozdenovic and Liangxiao Xin and David Starobinski
Many performance characteristics of wireless devices are fundamentally influenced by their vendor-specific physical layer implementation. Yet, characterizing the physical layer behavior of wireless devices usually requires complex testbeds with expen…
July 2020 • Computer Communications
pdf urlBecker, Johannes K and Li, David and Starobinski, David
Bluetooth Low Energy (BLE) devices use public (non-encrypted) advertising channels to announce their presence to other devices. To prevent tracking on these public channels, devices may use a periodically changing, randomized address instead of their…
July 2019 • Proceedings on Privacy Enhancing Technologies Symposium
pdf urlBecker, Johannes K and Starobinski, David
Motivated by IoT security monitoring applications, we consider the problem of a wireless monitor that must implement a multi-channel scanning policy to minimize the Age of Information (AoI) of received information. We model this problem as a Markov D…
October 2022 • Proceedings of the 2022 IEEE 7th World Forum on Internet of Things (WF-IoT)
pdfGvozdenovic, Stefan and Becker, Johannes K and Mikulskis, John and Starobinski, David
Network reconnaissance is a core security functionality, which can be used to detect hidden unauthorized devices or to identify missing devices. Currently, there is a lack of network reconnaissance tools capable of discovering Internet of Things (IoT…
October 2022 • 2022 IEEE Conference on Communications and Network Security (CNS)
pdf urlGvozdenovic, Stefan and Becker, Johannes K and Starobinski, David
We demonstrate characterization of Zigbee devices at the physical layer using commodity software-defined radio (SDR) hardware and an open-source software testbed setup. Using this testbed, we run different types of experiments to characterize and dis…
August 2020 • 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS)
pdf urlGvozdenovic, Stefan and Becker, Johannes K and Mikulskis, John and Starobinski, David
We present and evaluate Truncate-after-Preamble (TaP) attacks, whereby a receiver cannot decode an incoming signal despite good channel conditions. In a TaP attack, the attacker announces a large payload length using a standard preamble and packet le…
July 2020 • Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks
pdf urlXin, Liangxiao and Becker, Johannes K and Gvozdenovic, Stefan and Starobinski, David
November 2019 • Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems
pdf urlMikulskis, John and Becker, Johannes K. and Gvozdenovic, Stefan and Starobinski, David
Network mapping tools designed for IP-based networks generally do not provide access to non-IP based wireless protocols used by Internet of Things (IoT) devices, such as Zigbee and Bluetooth LE. We present Snout, a versatile and extensible software d…
November 2019 • Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
pdf url