Title | Analyzing the Security of Bluetooth Low Energy |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Sevier, Seth, Tekeoglu, Ali |
Conference Name | 2019 International Conference on Electronics, Information, and Communication (ICEIC) |
Keywords | BLE devices, Bluetooth, bluetooth low energy, bluetooth security, composability, Cyber physical system, cyber physical systems, Encryption, Hardware, Human Behavior, Internet of Things, Internet of Things devices, IoT, malicious actors, Protocols, pubcrawl, resilience, Resiliency, security, security of data, security standards, sensitive information, Software, Standards, Ubertooth |
Abstract | Internet of Things devices have spread to near ubiquity this decade. All around us now lies an invisible mesh of communication from devices embedded in seemingly everything. Inevitably some of that communication flying around our heads will contain data that must be protected or otherwise shielded from tampering. The responsibility to protect this sensitive information from malicious actors as it travels through the air then falls upon the standards used to communicate this data. Bluetooth Low Energy (BLE) is one of these standards, the aim of this paper is to put its security standards to test. By attempting to exploit its vulnerabilities we can see how secure this standard really is. In this paper, we present steps for analyzing the security of BLE devices using open-source hardware and software. |
DOI | 10.23919/ELINFOCOM.2019.8706457 |
Citation Key | sevier_analyzing_2019 |