A defensive man-in-middle approach to filter BLE packets

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we propose an original defensive strategy in which we benefit from the use of Man-in-The-Middle attacks in order to protect some vulnerable BLE devices. More precisely, we describe a tool that uses a Man-in-The-Middle attack to implement a wireless firewall for BLE communications, that is able to block specific commands, make some services invisible on BLE devices, or to force out weak pairing mechanisms.

Cite

CITATION STYLE

APA

Aboukora, A., Bonnet, G., Galtier, F., Cayre, R., Nicomette, V., & Auriol, G. (2021). A defensive man-in-middle approach to filter BLE packets. In WiSec 2021 - Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (pp. 365–367). Association for Computing Machinery, Inc. https://doi.org/10.1145/3448300.3468259

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free