From the news
- Chancellor Amma Addresses the Parliament of World’s Religions
- Amrita Students Qualify for the European Mars Rover Challenge
Publication Type : Conference Proceedings
Publisher : 5th International Conference on Advanced Computing & Communication Systems
Source : 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS), p.694-698 (2019)
Campus : Coimbatore
School : School of Engineering
Department : Computer Science
Year : 2019
Abstract : BLE is used to transmit and receive data between sensors and devices. Most of the IOT devices employ BLE for wireless communication because it suits their requirements such as less energy constraints. The major security vulnerabilities in BLE protocol can be used by attacker to perform MITM attacks and hence violating confidentiality and integrity of data. Although BLE 4.2 prevents most of the attacks by employing elliptic-curve diffie-Hellman to generate LTK and encrypt the data, still there are many devices in the market that are using BLE 4.0, 4.1 which are vulnerable to attacks. This paper shows the simple demonstration of possible attacks on BLE devices that use various existing tools to perform spoofing, MITM and firmware attacks. We also discussed the security, privacy and its importance in BLE devices.
Cite this Research Publication : G. S Pallavi and Anantha Narayanan V., “An Overview of Practical Attacks on BLE Based IOT Devices and Their Security”, 2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS). pp. 694-698 , 2019.