Security and privacy threats for bluetooth low energy in iot and wearable devices: A comprehensive survey

A Barua, MA Al Alamin, MS Hossain… - IEEE Open Journal of …, 2022 - ieeexplore.ieee.org
Bluetooth Low Energy (BLE) has become the de facto communication protocol for the
Internet of Things (IoT) and smart wearable devices for its ultra-low energy consumption …

A survey of protocol fuzzing

X Zhang, C Zhang, X Li, Z Du, B Mao, Y Li… - ACM Computing …, 2024 - dl.acm.org
Communication protocols form the bedrock of our interconnected world, yet vulnerabilities
within their implementations pose significant security threats. Recent developments have …

[HTML][HTML] A survey on Bluetooth Low Energy security and privacy

M Cäsar, T Pawelke, J Steffan, G Terhorst - Computer Networks, 2022 - Elsevier
Since its introduction in 2009, Bluetooth Low Energy (BLE) has become a remarkable
success. Due to its unique properties of low power requirements and its ubiquitous …

Man-in-the-Middle attack mitigation in internet of medical things

O Salem, K Alsubhi, A Shaafi… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The Internet of Medical Things are susceptible to Man-in-the-Middle (MitM) attack, which can
identify healthcare emergency of monitored patients and replay normal physiological data to …

Sok: The long journey of exploiting and defending the legacy of king harald bluetooth

J Wu, R Wu, D Xu, DJ Tian… - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Named after the Viking King Harald Bluetooth, Bluetooth is the de facto standard for short-
range wireless communications. The introduction of Bluetooth Low Energy (BLE) and Mesh …

Securing Bluetooth Low Energy networking: An overview of security procedures and threats

A Lacava, V Zottola, A Bonaldo, F Cuomo, S Basagni - Computer Networks, 2022 - Elsevier
Abstract Bluetooth Low Energy (BLE) is rapidly becoming the de-facto standard for short-
range wireless communications among resource-constrained wireless devices. Securing …

A survey of automatic contact tracing approaches using Bluetooth Low Energy

L Reichert, S Brack, B Scheuermann - ACM transactions on Computing …, 2021 - dl.acm.org
To combat the ongoing Covid-19 pandemic, many new ways have been proposed on how to
automate the process of finding infected people, also called contact tracing. A special focus …

Bleem: Packet sequence oriented fuzzing for protocol implementations

Z Luo, J Yu, F Zuo, J Liu, Y Jiang, T Chen… - 32nd USENIX Security …, 2023 - usenix.org
Protocol implementations are essential components in network infrastructures. Flaws hidden
in the implementations can easily render devices vulnerable to adversaries. Therefore …

A test environment for wireless hacking in domestic IoT scenarios

A Muñoz, C Fernández-Gago, R López-Villa - Mobile Networks and …, 2023 - Springer
Security is gaining importance in the daily life of every citizen. The advent of Internet of
Things devices in our lives is changing our conception of being connected through a single …

{BrakTooth}: Causing havoc on bluetooth link manager via directed fuzzing

ME Garbelini, V Bedi, S Chattopadhyay, S Sun… - 31st USENIX Security …, 2022 - usenix.org
In this paper we propose, design and evaluate a systematic directed fuzzing framework to
automatically discover implementation bugs in arbitrary Bluetooth Classic (BT) devices. The …