Connection Dumping Vulnerability Affecting Bluetooth Availability
@inproceedings{Lounis2018ConnectionDV, title={Connection Dumping Vulnerability Affecting Bluetooth Availability}, author={Karim Lounis and Mohammad Zulkernine}, booktitle={CRiSIS}, year={2018} }
Over the last few years, Bluetooth technology has been deployed in millions of devices including laptops, watches, mobile phones, cars, printer, and many other devices. It has been rapidly adopted as a short-range wireless communication technology for different IoT applications such as smart cities, smart healthcare, and smart grids. Yet, little attention has been paid to Bluetooth security. In this paper, we report a new Bluetooth vulnerability, named connection dumping. We show that this…
4 Citations
Bluetooth Low Energy Makes “Just Works” Not Work
- Computer Science2019 3rd Cyber Security in Networking Conference (CSNet)
- 2019
This paper discusses how Bluetooth devices that use the Just Works pairing mode can be exploited to become nonoperational, and presents a vulnerability that is due to the behavior of BLE smart devices and the Just works pairing mode.
Attacks and Defenses in Short-Range Wireless Technologies for IoT
- Computer ScienceIEEE Access
- 2020
This paper provides a survey of attacks related to the wireless infrastructures of IoT, and to the most used short-range wireless communication technologies in the resource-constrained part of IoT in particular, and provides a taxonomy of these attacks based on a security service-based attack classification.
Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective
- Computer ScienceAd Hoc Networks
- 2022
References
SHOWING 1-7 OF 7 REFERENCES
Bluetooth for Java
- Computer ScienceApress
- 2003
In the book, Bruce Hopkins and Ranjith Antony describe how to develop wireless Java applications using Bluetooth for a variety of platforms, including an API overview of the Java library, development of Bluetooth-based services, highlights of security concerns, and walkthroughs for development with some of the different tools available.
Security Weaknesses in Bluetooth
- Computer ScienceCT-RSA
- 2001
A range of methods can be employed to strengthen the protocol and prevent the newly discovered attacks, including a location attack, which can be used for industrial espionage, blackmail, and other undesirable activities.
Bluetooth Application Programming with the Java APIs Essentials Edition
- Computer Science
- 2008
The latest updates to the JABWT standard, defined by the JSR-82 Java Specification Request, supports rapid development of Bluetooth applications that are portable, secure, and highly-usable.
Man-in-the-middle attacks on Secure Simple Pairing in Bluetooth standard V5.0 and its countermeasure
- Computer SciencePersonal and Ubiquitous Computing
- 2017
It is demonstrated that the passkey entry association model in SSP is vulnerable to the MITM attack, once the host reuses the passkeys, and an improved passkeyentry protocol is designed to fix the reusing passkey defect in the pass Keyed Entry Association model.
BlueSniff: Eve Meets Alice and Bluetooth
- Computer ScienceWOOT
- 2007
This work results in the first open-source Bluetooth sniffer, showing how the full MAC address of master devices can be obtained, therefore bypassing the access control of this feature.
Implementing an Attack on Bluetooth 2.1+ Secure Simple Pairing in Passkey Entry Mode
- Computer Science2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
- 2012
The practicality of the Passkey Entry method, which uses a PIN entered on one or both devices to authenticate the key agreement, is explored and it is shown that it is should be taken very seriously.