Bluetooth: With Low Energy Comes Low Security

نویسنده

  • Mike Ryan
چکیده

We discuss our tools and techniques to monitor and inject packets in Bluetooth Low Energy. Also known as BTLE or Bluetooth Smart, it is found in recent high-end smartphones, sports devices, sensors, and will soon appear in many medical devices. We show that we can effectively render useless the encryption of any Bluetooth Low Energy link.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Survey of Security Vulnerabilities in Bluetooth Low Energy Beacons

There are currently 4 million Bluetooth Low Energy beacons, such as Apple’s iBeacons, deployed worldwide, with more being used in an increasingly wide variety of fields, from marketing to navigation. Yet, there is a lack of focus on the impact of security on beacon deployments. This report looks to capture an overview of current beacon deployments, the current vulnerabilities and risks present ...

متن کامل

Personnel Security System using Bluetooth Low Energy (BLE) Tag

One of the primary aspects of Personal security is through various user authentication techniques like biometrics, password, Smart Card, etc. We propose to design a personal security authentication system using the commonly available Bluetooth technology. The authentication is done on a fixed device, connected to the web and the identity is provided by a mobile device commonly carried by the pe...

متن کامل

Toward a Robust Security Paradigm for Bluetooth Low Energy-Based Smart Objects in the Internet-of-Things

Bluetooth Low Energy (BLE) has emerged as one of the most promising technologies to enable the Internet-of-Things (IoT) paradigm. In BLE-based IoT applications, e.g., wearables-oriented service applications, the Bluetooth MAC addresses of devices will be swapped for device pairings. The random address technique is adopted to prevent malicious users from tracking the victim's devices with statio...

متن کامل

Improved Pairing Protocol for Bluetooth

The Bluetooth wireless technology realizes a low-cost shortrange wireless voiceand data-connection through radio propagation. Bluetooth also has a security architecture. In this paper, we focus on the key agreement protocol, which is the most critical part of this security architecture. Several security flaws have been identified within the Bluetooth protocols: an attacker can track users by mo...

متن کامل

Exploiting Bluetooth Low Energy Pairing Vulnerability in Telemedicine

Telemetry has potentially large contributions to future medical applications. In the past decade wireless devices have invaded the medical area with a wide range of capability as components of a wireless personal area network (WPAN) and Wireless Body Area Network (WBAN). These applications in medical telemetry are not only improving the quality of life of patients and doctor-patient efficiency,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013