Visible to the public Extracting the Security Features Implemented in a Bluetooth LE Connection

TitleExtracting the Security Features Implemented in a Bluetooth LE Connection
Publication TypeConference Paper
Year of Publication2018
AuthorsRobles-Cordero, A. M., Zayas, W. J., Peker, Y. K.
Conference Name2018 IEEE International Conference on Big Data (Big Data)
Date Publisheddec
KeywordsBluetooth, Bluetooth devices, Bluetooth LE connection, Bluetooth LE devices, Bluetooth LE security, bluetooth low energy, bluetooth security, Bluetooth Smart, Bluetooth special interest group, composability, computer network security, data mining, Encryption, feature extraction, Frontline BPA Low Energy Analyzer, Human Behavior, mobile computing, Protocols, pubcrawl, Resiliency, smart phones
AbstractSince its introduction in 2010, Bluetooth Low Energy (LE) has seen an abrupt adoption by top companies in the world. From smartphones, PCs, tablets, smartwatches to fitness bands; Bluetooth Low Energy is being implemented more and more on technological devices. Even though the Bluetooth Special Interest Group includes and strongly recommends implementations for security features in their standards for Bluetooth LE devices, recent studies show that many Bluetooth devices do not follow the recommendations. Even worse consumers are rarely informed about what security features are implemented by the products they use. The ultimate goal in this study is to provide a mechanism for users to inform them of the security features implemented in a Bluetooth LE connection that they have initiated. To this end, we developed an app for Android phones that extracts the security features of a Bluetooth LE connection using the btsnoop log stored on the phone. We have verified the correctness of our app using the Frontline BPA Low Energy Analyzer.
DOI10.1109/BigData.2018.8622000
Citation Keyrobles-cordero_extracting_2018