Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey
A Barua, MA Al Alamin, MS Hossain… - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …
A survey of protocol fuzzing
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …
within their implementations pose significant security threats. Recent developments have …
[HTML][HTML] A survey on Bluetooth Low Energy security and privacy
M Cäsar, T Pawelke, J Steffan, G Terhorst - Computer Networks, 2022 - Elsevier
Since its introduction in 2009, Bluetooth Low Energy (BLE) has become a remarkable
success. Due to its unique properties of low power requirements and its ubiquitous …
success. Due to its unique properties of low power requirements and its ubiquitous …
Man-in-the-Middle attack mitigation in internet of medical things
The Internet of Medical Things are susceptible to Man-in-the-Middle (MitM) attack, which can
identify healthcare emergency of monitored patients and replay normal physiological data to …
identify healthcare emergency of monitored patients and replay normal physiological data to …
Sok: The long journey of exploiting and defending the legacy of king harald bluetooth
Named after the Viking King Harald Bluetooth, Bluetooth is the de facto standard for short-
range wireless communications. The introduction of Bluetooth Low Energy (BLE) and Mesh …
range wireless communications. The introduction of Bluetooth Low Energy (BLE) and Mesh …
Securing Bluetooth Low Energy networking: An overview of security procedures and threats
Abstract Bluetooth Low Energy (BLE) is rapidly becoming the de-facto standard for short-
range wireless communications among resource-constrained wireless devices. Securing …
range wireless communications among resource-constrained wireless devices. Securing …
A survey of automatic contact tracing approaches using Bluetooth Low Energy
L Reichert, S Brack, B Scheuermann - ACM transactions on Computing …, 2021 - dl.acm.org
To combat the ongoing Covid-19 pandemic, many new ways have been proposed on how to
automate the process of finding infected people, also called contact tracing. A special focus …
automate the process of finding infected people, also called contact tracing. A special focus …
Bleem: Packet sequence oriented fuzzing for protocol implementations
Protocol implementations are essential components in network infrastructures. Flaws hidden
in the implementations can easily render devices vulnerable to adversaries. Therefore …
in the implementations can easily render devices vulnerable to adversaries. Therefore …
A test environment for wireless hacking in domestic IoT scenarios
A Muñoz, C Fernández-Gago, R López-Villa - Mobile Networks and …, 2023 - Springer
Security is gaining importance in the daily life of every citizen. The advent of Internet of
Things devices in our lives is changing our conception of being connected through a single …
Things devices in our lives is changing our conception of being connected through a single …
{BrakTooth}: Causing havoc on bluetooth link manager via directed fuzzing
In this paper we propose, design and evaluate a systematic directed fuzzing framework to
automatically discover implementation bugs in arbitrary Bluetooth Classic (BT) devices. The …
automatically discover implementation bugs in arbitrary Bluetooth Classic (BT) devices. The …