Publication Type:

Conference Proceedings

Source:

2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), p.694-698 (2019)

URL:

https://www.semanticscholar.org/paper/An-Overview-of-Practical-Attacks-on-BLE-Based-IOT-Pallavi-Narayanan/ba4cf02b3ce9d366944374edcb2550dd2a312bb4

Abstract:

BLE is used to transmit and receive data between sensors and devices. Most of the IOT devices employ BLE for wireless communication because it suits their requirements such as less energy constraints. The major security vulnerabilities in BLE protocol can be used by attacker to perform MITM attacks and hence violating confidentiality and integrity of data. Although BLE 4.2 prevents most of the attacks by employing elliptic-curve diffie-Hellman to generate LTK and encrypt the data, still there are many devices in the market that are using BLE 4.0, 4.1 which are vulnerable to attacks. This paper shows the simple demonstration of possible attacks on BLE devices that use various existing tools to perform spoofing, MITM and firmware attacks. We also discussed the security, privacy and its importance in BLE devices.

Cite this Research Publication

G. S Pallavi and Anantha Narayanan V., “An Overview of Practical Attacks on BLE Based IOT Devices and Their Security”, 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS). pp. 694-698 , 2019.