Visible to the public Analyzing the Security of Bluetooth Low Energy

TitleAnalyzing the Security of Bluetooth Low Energy
Publication TypeConference Paper
Year of Publication2019
AuthorsSevier, Seth, Tekeoglu, Ali
Conference Name2019 International Conference on Electronics, Information, and Communication (ICEIC)
KeywordsBLE devices, Bluetooth, bluetooth low energy, bluetooth security, composability, Cyber physical system, cyber physical systems, Encryption, Hardware, Human Behavior, Internet of Things, Internet of Things devices, IoT, malicious actors, Protocols, pubcrawl, resilience, Resiliency, security, security of data, security standards, sensitive information, Software, Standards, Ubertooth
AbstractInternet of Things devices have spread to near ubiquity this decade. All around us now lies an invisible mesh of communication from devices embedded in seemingly everything. Inevitably some of that communication flying around our heads will contain data that must be protected or otherwise shielded from tampering. The responsibility to protect this sensitive information from malicious actors as it travels through the air then falls upon the standards used to communicate this data. Bluetooth Low Energy (BLE) is one of these standards, the aim of this paper is to put its security standards to test. By attempting to exploit its vulnerabilities we can see how secure this standard really is. In this paper, we present steps for analyzing the security of BLE devices using open-source hardware and software.
DOI10.23919/ELINFOCOM.2019.8706457
Citation Keysevier_analyzing_2019