Publication Type : Conference Paper
Publisher : IEEE
Source : 2025 Innovations in Power and Advanced Computing Technologies (i-PACT)
Url : https://doi.org/10.1109/i-pact65952.2025.11307963
Campus : Chennai
School : School of Computing
Department : Computer Science and Engineering
Year : 2025
Abstract :
Power depletion attacks are putting the security of Bluetooth Low Energy devices at greater risk, but the available tools don't allow for thorough testing. To assess security using the most recent battery exhaustion techniques, this paper presents an open-source BLE analysis tool with a graphical user interface. The system, which was built in Python using standard libraries, can discover devices, enumerate services, and launch three types of attacks: high-frequency writing, notification o verload, and sustained reading. According to tests, the tool significantly lowers power consumption when compared to traditional methods, running at about 120 commands per second during write attacks. Effective vulnerability assessment is made possible by the solution's visual tracking of signal strength and device proximity. Our implementation generates actionable security metrics and cuts down on testing time. © 2025 IEEE.
Cite this Research Publication : Dharshini Sri S U, Mohanraj Venkatesan, Udhaya Kumar S, Exploiting Bluetooth Low Energy Vulnerabilities in Smartwatches Through UUID Manipulation, 2025 Innovations in Power and Advanced Computing Technologies (i-PACT), IEEE, 2025, https://doi.org/10.1109/i-pact65952.2025.11307963