Visible to the public An Overview of Practical Attacks on BLE Based IOT Devices and Their Security

TitleAn Overview of Practical Attacks on BLE Based IOT Devices and Their Security
Publication TypeConference Paper
Year of Publication2019
AuthorsPallavi, Sode, Narayanan, V Anantha
Conference Name2019 5th International Conference on Advanced Computing Communication Systems (ICACCS)
KeywordsBLE, BLE 4.0, BLE 4.1, BLE 4.2, BLE devices, BLE protocol, Bluetooth, bluetooth security, composability, cryptographic protocols, cryptography, Cyber physical system, cyber physical systems, elliptic-curve diffie-Hellman, firmware, firmware attacks, Human Behavior, Image color analysis, Internet of Things, IoT devices, LTK, Microprogramming, MITM attacks, mobile applications, mobile computing, pairing, performance evaluation, pubcrawl, public key cryptography, resilience, Resiliency, security vulnerabilities, telecommunication security, vulnerabilities, Wireless communication
AbstractBLE is used to transmit and receive data between sensors and devices. Most of the IOT devices employ BLE for wireless communication because it suits their requirements such as less energy constraints. The major security vulnerabilities in BLE protocol can be used by attacker to perform MITM attacks and hence violating confidentiality and integrity of data. Although BLE 4.2 prevents most of the attacks by employing elliptic-curve diffie-Hellman to generate LTK and encrypt the data, still there are many devices in the market that are using BLE 4.0, 4.1 which are vulnerable to attacks. This paper shows the simple demonstration of possible attacks on BLE devices that use various existing tools to perform spoofing, MITM and firmware attacks. We also discussed the security, privacy and its importance in BLE devices.
DOI10.1109/ICACCS.2019.8728448
Citation Keypallavi_overview_2019