Bluetooth: With Low Energy Comes Low Security
نویسنده
چکیده
We discuss our tools and techniques to monitor and inject packets in Bluetooth Low Energy. Also known as BTLE or Bluetooth Smart, it is found in recent high-end smartphones, sports devices, sensors, and will soon appear in many medical devices. We show that we can effectively render useless the encryption of any Bluetooth Low Energy link.
منابع مشابه
A Survey of Security Vulnerabilities in Bluetooth Low Energy Beacons
There are currently 4 million Bluetooth Low Energy beacons, such as Apple’s iBeacons, deployed worldwide, with more being used in an increasingly wide variety of fields, from marketing to navigation. Yet, there is a lack of focus on the impact of security on beacon deployments. This report looks to capture an overview of current beacon deployments, the current vulnerabilities and risks present ...
متن کاملPersonnel Security System using Bluetooth Low Energy (BLE) Tag
One of the primary aspects of Personal security is through various user authentication techniques like biometrics, password, Smart Card, etc. We propose to design a personal security authentication system using the commonly available Bluetooth technology. The authentication is done on a fixed device, connected to the web and the identity is provided by a mobile device commonly carried by the pe...
متن کاملToward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things
Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim's devices with statio...
متن کاملImproved Pairing Protocol for Bluetooth
The Bluetooth wireless technology realizes a low-cost shortrange wireless voiceand data-connection through radio propagation. Bluetooth also has a security architecture. In this paper, we focus on the key agreement protocol, which is the most critical part of this security architecture. Several security flaws have been identified within the Bluetooth protocols: an attacker can track users by mo...
متن کاملExploiting Bluetooth Low Energy Pairing Vulnerability in Telemedicine
Telemetry has potentially large contributions to future medical applications. In the past decade wireless devices have invaded the medical area with a wide range of capability as components of a wireless personal area network (WPAN) and Wireless Body Area Network (WBAN). These applications in medical telemetry are not only improving the quality of life of patients and doctor-patient efficiency,...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013