arXiv Analytics

Sign in

arXiv:2301.03852 [cs.CR]AbstractReferencesReviewsResources

BLE Protocol in IoT Devices and Smart Wearable Devices: Security and Privacy Threats

Tushar Nagrare, Parul Sindhewad, Faruk Kazi

Published 2023-01-10Version 1

Bluetooth Low Energy (BLE) has become the primary transmission media due to its extremely low energy consumption, good network scope, and data transfer speed for the Internet of Things (IoT) and smart wearable devices. With the exponential boom of the Internet of Things (IoT) and the Bluetooth Low Energy (BLE) connection protocol, a requirement to discover defensive techniques to protect it with practical security analysis. Unfortunately, IoT-BLE is at risk of spoofing assaults where an attacker can pose as a gadget and provide its users a harmful information. Furthermore, due to the simplified strategy of this protocol, there were many security and privacy vulnerabilities. Justifying this quantitative security analysis with STRIDE Methodology change to create a framework to deal with protection issues for the IoT-BLE sensors. Therefore, providing probable attack scenarios for various exposures in this analysis, and offer mitigating strategies. In light of this authors performed STRIDE threat modeling to understand the attack surface for smart wearable devices supporting BLE. The study evaluates different exploitation scenarios Denial of Service (DoS), Elevation of privilege, Information disclosure, spoofing, Tampering, and repudiation on MI Band, One plus Band, Boat Storm smartwatch, and Fire Bolt Invincible.

Related articles: Most relevant | Search more
arXiv:1902.08595 [cs.CR] (Published 2019-02-22)
Penetration Tests for Bluetooth Low Energy and Zigbee using the Software-Defined Radio
arXiv:1912.12373 [cs.CR] (Published 2019-12-28)
How Secure Is Your IoT Network?
arXiv:2311.06938 [cs.CR] (Published 2023-11-12)
5G Networks and IoT Devices: Mitigating DDoS Attacks with Deep Learning Techniques