Abstract
In the last years, the Internet of Things (IoT) has become integral part of our lives and its influence is expected to exponentially increase in the next years. For several reasons, however, the development of IoT has not gone hand in hand with an adequate reinforcement and consolidation of our security and privacy, despite the serious impact that IoT vulnerabilities may have on our digital and physical security. Bluetooth Low Energy (BLE), also known as Bluetooth Smart, is the most popular protocol for interfacing smart devices, wearables, and medical equipment. This contribution surveys the key security issues in the BLE protocol and discusses a possible architecture for BLE Man-in-The-Middle (MitM) attacks together with the related necessary equipment. In addition, after introducing some of the available tools for hacking BLE, a case-study based on their use was presented, which describes a MitM attack between a Bluetooth smart device and its designated mobile app. The case-study well exemplifies how easily, given the required proximity to the target, a possible hacker can control the data and, in some instances, even the mobile device itself, when connecting it to a BLE device.
Author supplied keywords
Cite
CITATION STYLE
Melamed, T. (2018). An active man-in-The-middle attack on bluetooth smart devices. In International Journal of Safety and Security Engineering (Vol. 8, pp. 200–211). WITPress. https://doi.org/10.2495/SAFE-V8-N2-200-211
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.