Abstract
In this paper, we propose an original defensive strategy in which we benefit from the use of Man-in-The-Middle attacks in order to protect some vulnerable BLE devices. More precisely, we describe a tool that uses a Man-in-The-Middle attack to implement a wireless firewall for BLE communications, that is able to block specific commands, make some services invisible on BLE devices, or to force out weak pairing mechanisms.
Cite
CITATION STYLE
Aboukora, A., Bonnet, G., Galtier, F., Cayre, R., Nicomette, V., & Auriol, G. (2021). A defensive man-in-middle approach to filter BLE packets. In WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (pp. 365–367). Association for Computing Machinery, Inc. https://doi.org/10.1145/3448300.3468259
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.